A panel of experts debates the ineffectiveness of the public, private partnership model in evolving a plan to develop an ideal framework to tackle cyber threats. What is needed to build an effective model to respond to future threats?
Security leaders discuss the cyber-threat challenges facing India's critical infrastructure, including energy, manufacturing, defense and transportation. What new strategies, solutions and best practices do they suggest to respond to emerging threats?
Despite the recent move to put the FBI-obtained court order against Apple on hold, the crypto debate is far from over, said a panel of law enforcement, legal and industry experts at Information Security Media Group's Fraud and Breach Prevention Summit in San Francisco.
Neither the FBI nor Apple looks good in the days following the postponement of a hearing on whether Apple should be forced to help the bureau crack open the iPhone of one of the San Bernardino shooters. The FBI's credibility is being questioned as Apple's security technology is being tarnished.
In many enterprises, the CISO reports to the CIO, and occasionally you find a CIO who reports to the CISO. But Venafi's Tammy Moskites holds both roles. How does she manage the natural tension between IT and security?
IDRBT Director Dr. Ramasastri says enterprises find managing data breaches increasingly difficult. Assembling pieces of the puzzle - technology, solutions, skills, compliance and security - needs an effective governance structure.
Vikrant Varshney of Risk Resources believes cyber threats are a concern of every individual, every organization who thought IT is just a system. A collaborative approach in building awareness is acute to fight this cyberwar, he says.
As ISMG's Data Breach Summit Asia 2016 in Bangalore wrapped up, security practitioners seemed excited to seek answers from experts on the challenges bothering them while putting a breach response plan in place.
ISMG's Data Breach Summit aims to provide insights from industry thought-leaders on the best defense strategies for tackling future breaches. The conference kicked off to great traction from the security community.
ISMG's upcoming Data Breach Summit Asia in Bangalore will provide insights from industry thought-leaders on the best defense strategies for tackling future breaches. In the face of increasing targeted attacks, cyber extortion and the growing threat to critical infrastructure, there is plenty to discuss, debate and...
Dr. Sanjay Bahl has been appointed director general of CERT-In, according to inside sources. Security practitioners welcome the move and expect to see a new agenda and thrust on effective public private partnership.
Email security is a growing worry, despite the fact that phishing attacks and spam have been around for decades, says Vidur Apparao, CTO of Agari. In this video interview, he explains why DMARC is gaining ground as a viable way to shore up email defenses.
Because of growing cybersecurity concerns, CISOs in the financial sector finally are getting more time with their boards of directors and more direct interaction with senior executives, says John Carlson, chief of staff at the Financial Services Information Sharing and Analysis Center.
Automated threat intelligence sharing can significantly reduce the amount of time it takes organizations to identify, assess and react to attacks, according to new research from Johns Hopkins. Mark Clancy, CEO of Soltra, says automated information sharing with government and other sectors is catching on.