Singapore plans to introduce a cybersecurity bill to protect its critical infrastructure from cyber threats and make investments in skills-building. Information security experts weigh in with their candid reactions to this emerging legislation.
What are the challenges when it comes to operationalizing threat intelligence feeds in the context of your business and environment? Organizations first must ensure they make best use of intelligence available internally. Arbor's Crane shares insight
As nations worldwide struggle with effective cyber legislation, Europe leads. Dr. Henning Wegener, chairman at World Federation Of Scientists' Permanent Monitoring Panel on InfoSec, speaks to what makes this possible.
As the US government enacts its Cybersecurity Information Sharing Act, the question becomes: Is India ready for such legislation? What bottlenecks await, and how effectively are public and private players engaged to tackle info-sharing challenges?
India's cybersecurity efforts so far demonstrate a lack of coherent direction and strategic vision from the government. Unless leaders get their act together, this deficiency will hamper India's digital dreams.
Malaysia expects to witness increased incidents of commercial fraud, ransomware and online scams in 2016. Cybersecurity head Amiruddin Abdul Wahab drives the agenda for securing cyberspace and discusses measures to tackle threats.
India's and Malaysia's cybersecurity teams look to strike a chord to collaborate and share best security practices to respond to security incidents. But the question is: Who will take the lead and has the expertise to face the challenges?
India and Singapore signed a MoU to tackle cybersecurity challenges by setting up an incident prevention and response mechanism, which is operationally ready, as well as establishing an information sharing mechanism for best practices.
ITSERT-NP, formed to address Nepal's cybersecurity challenges, faces the task of prescribing policy guidelines and mandates, as well as establishing an information-sharing platform to secure Nepal against growing threats.
As the unfolding investigation into the Paris attacks shows, just sharing threat-related data - without adding the crucial context that turns it into actionable intelligence - won't help organizations block attacks.
Despite near-constant warnings from law enforcement officials and the information security community, too many organizations still aren't taking security seriously, experts warned at the Irish Cyber Crime Conference in Dublin.
In the wake of the Paris attacks, cybersecurity expert Brian Honan argues that now is not the time to make snap public policy decisions that attempt to promote or restrict either cryptography or surveillance.
The Irish Reporting and Information Security Service's IRISSCON Cyber Crime Conference is due to touch on DDoS, fraud, breach response, malware, social engineering, the Paris terror attacks and more.
Brijesh Singh, CISO for the state of Maharashtra and IG of CID, says that the threat is evolving in such a manner that it is impossible for law enforcement alone to tackle it. "All of our traditional models of policing, they don't work here."
Building a strong platform to secure enterprise email systems is like piecing together a puzzle by joining existing technologies from various sources. NIST is readying a guide to do just that.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.