The entire approach toward Aadhaar security needs to change to address problems on the users' end, rather than focus on the UIDAI's core database, contends Na. Vijayashankar, a cyber law expert. He'll be a featured speaker at ISMG's Fraud and Breach Prevention Summit in Bengaluru.
Leading the latest edition of the ISMG Security Report: Our exclusive report on an Australian criminal investigation into a company that apparently swiped cryptocurrency using a software backdoor. Also, cutting through the hype on artificial intelligence and machine learning.
Since its inception the NIST Cybersecurity Framework has been embraced across geographies and sectors. Trend Micro's Ed Cabrera talks about how to maximize the framework as a baseline for improving cybersecurity posture.
Companies offering cybersecurity products are using the terms "artificial intelligence" and "machine learning" in many different ways. But the real meanings of the terms are far more nuanced than marketing hyperbole would lead us to believe, says Grant Wernick of Insight Engines.
Machine learning is supporting new ways of battling evolving cyber threats, such as by analyzing behaviors, says Darshan Appayanna, CISO at Happiest Minds, an IT services firm, who will be a featured speaker at ISMG's upcoming Fraud and Breach Prevention Summit in Bengaluru.
Apps for smartphones pose many privacy risks. But Venugopal C of Check Point says the European Union's General Data Protection Regulation, which is now being enforced, potentially could have an impact on the kind of information apps gather.
Leading the latest edition of the ISMG Security Report: Cybersecurity expert Brian Honan provides insights on why organizations that are not yet compliant with GDPR need to focus on several key steps. Also: An assessment of the progress women are making in building careers in information security.
Cybersecurity challenges and solutions have evolved greatly since 2002. And so has the Executive Women's Forum, which was founded that year to advance female leaders in the profession. Founder Joyce Brocaglia reflects on the forum's accomplishments and challenges.
What happens if organizations that must comply with GDPR have yet to achieve compliance, despite having had two years to do so before enforcement began? Don't panic, says cybersecurity expert Brian Honan, but do be pursuing a data privacy transparency and accountability action plan.
Compliance with the EU's General Data Protection Regulation, which is now being enforced, will be tougher for large organizations in the payments sector because they have huge volumes of data, says Swati Sharma, a security specialist at British Telecom.
As Japan continues it push toward digital transactions, it's taking steps to ensure security, including adopting the PCI Data Security Standard, says Jeremy King, international director of the PCI Security Standards Council, who offers an update.
File-less malware is a huge security challenge for organizations today, and traditional email security controls aren't sufficient to meet the challenge. Burke Long of Lastline offers insight on a new way to approach email security.
Security leaders have been addressing the global skills gap for better than a decade now, with little to show for it. But Joe Cosmano of iboss recommends a new approach, leveraging software-as-a-service to make up for the staffing shortfall.
Leading the latest edition of the ISMG Security Report: Reports on the impact enforcement of the EU's General Data Protection Regulation, which began Friday, will have on the healthcare and banking sectors. Plus an assessment of GDPR compliance issues in Australia, which offer lessons to others worldwide.
With enforcement of the EU's GDPR set to begin on May 25, Australian organizations vary in readiness. Steve Ingram of PwC says it's not too late for companies to prepare for GDPR, but it will be too late to ask regulators for forgiveness if something goes wrong.