Fighting increased incidents of fraud is going to be a challenge, given lack of regulation, awareness and skills. Dhruv Phophalia, Head of Alvarez and Marsal's global forensics practice, offers insights.
The Supreme Court has quashed Section 118 (d) of the Kerala Police Act for violating the fundamental right of freedom. Some cyberlaw experts call it a short-sighted decision that will deter the fight against cybercrime.
As information sharing becomes increasingly vital in building resilient cybersecurity, FS-ISAC's Denise Anderson discusses how the Indian financial sector should put a strong collaborative structure in place.
Web.com won't confirm or deny that its Register.com subsidiary, which manages more than 2 million domain names, has been breached. But a news report claims the FBI is investigating a year-old intrusion.
Ransomware attacks are getting more agile, varied and widespread, and are increasingly taking aim at businesses of all sizes in all sectors, rather than consumers. That's why employee education is so critical.
Venkatesh Subramaniam, CISO of Idea Cellular, describes how Indian security practitioners should communicate to business leaders about the evolving threat landscape in order to get the funding they need to secure enterprise infrastructure.
During her first month on the job, former Secretary of State Hillary Clinton used a private email server that lacked a digital certificate that would have ensured encrypted and authenticated email communications, surmises security firm Venafi.
"Align technology with businesses" is an old phrase. But information security is now part of this change, making strides to align with growth as a business enabler. Enter: the converged technology operations center.
As part of its biggest reorganization in its nearly seven-decade history, the Central Intelligence Agency is creating a Directorate of Digital Innovation that will use cyber technology to amass and analyze intelligence.
Weaponized roller coasters? Kidnappers hacking babycams? Forget over-the-top "CSI: Cyber" hacking plots. The hackers behind the Rogers ISP breach, in their quest for bitcoins, claim they wielded nothing more serious than a telephone call.
Security leaders expect the new Union budget to give a needed boost to cybersecurity education, as well as increased investment in critical infrastructure, biometrics and surveillance to fight cybercrime.