ISMG's upcoming Data Breach & Fraud Prevention Summit Asia 2016 in Mumbai will focus on the latest fraud techniques and technologies, as industry thought leaders take us through new approaches to tackle breaches as well as today's top schemes and solutions to stop them.
The Hong Kong Monetary Authority plans to raise the cybersecurity of its banking system through a new, three-pronged approach. But critics say the regulator needs to come up with clear security mandates to ensure a cybersecure ecosystem.
Narayan Neelakantan, outgoing CISO at the National Stock Exchange of India, is concerned that the lack of capacity in incident response is going to haunt Indian organizations in the near future. He shares insight on IR maturity and the imminent need.
The Reserve Bank of India has issued new cybersecurity guidelines to scheduled banks, directing them to devise cybersecurity policies distinct from their institutions' existing IT or IS security policies.
Security is moving fast, but is still playing a catch-up game with technology. In this scenario, age-old paradigms need to be revised to remain relevant, says Oracle's security lead for APAC, Chris Pickett
Nandkumar Saravade, DSCI's chief, has been named CEO of Reserve Bank of India's new IT subsidiary. Security leaders set expectations for the new role and suggest important areas that need immediate attention.
IBM's Vaidyanathan Iyer says security practitioners need new tactics to bridge the skills gap and fight emerging threats. He suggests the use of analytics and machine learning would easily help fill the gap in detecting threats.
In the wake of reports that 65 million stolen credentials from micro-blogging platform Tumblr have surfaced online, following 117 million LinkedIn credentials, it's clear that 2016 is fast becoming the year of what one security expert dubs "historical mega breaches."
Cross-regional collaboration, biological cybernetics and active defense/deception technology where some of the forward-looking themes at the recent MESA event in Dubai. Here are some highlights from ground zero.
Since California passed its pioneering data breach notification law in 2003, many other states and some countries have followed suit. Here's a closer look at the status of breach notification requirements in four regions.
The U.S. Congress delves into the issue of whether CISOs should report to CIOs, a topic that leads the Friday, May 27, 2016, edition of the ISMG Security Report, an on-demand audio report offered every Tuesday and Friday.
As Asian countries work to bring their cybersecurity capacity up to speed, collaboration can help ease the burden. Dr. Amiruddin Wahab, Cybersecurity Malaysia's CEO, shares insight on national capacity building and cross-regional cooperation.
After years of debate, the EU's General Data Protection Regulation has finally passed. What impact - if any - will the GDPR have on business and future legislation in India? Security experts weigh in on this debate.
The business of executive email hacking is booming, with hundreds of millions of dollars lost in fraudulent wire transfers. But businesses can improve their processes to avoid inadvertently transferring funds to fraudsters, according to one expert.
Cyberattacks have gained regulatory attention worldwide. But the world doesn't need more regulation to address new threats, says Steve Durbin of the Information Security Forum. Instead, government must work more closely with the private sector.