He'd spent nearly 15 years in information security, then realized we needed to change our fundamental approach. Why did Art Gilliland, CEO of Skyport Systems, bet his career on this notion? And how is it paying off?
Amidst the tragedy of the urban flooding disaster in Chennai, businesses running critical operations are turning to business continuity management to resume operations. Thought-leader and former CISO Vishal Salvi shares advice.
President Obama's remarks urging "high-tech and law enforcement leaders to make it harder for terrorists to use technology to escape from justice" are being interpreted by some to mean that government and Silicon Valley should collaborate to create a backdoor to circumvent encryption on devices used by terrorists.
Indian enterprises are increasingly vulnerable to cyber fraud, according to Kroll's new Global Fraud Report. But too many of these organizations rely solely on a reactive approach to fraud, says Kroll's Reshmi Khurana.
Consultant, venture capitalist, retired chairman of RSA. Art Coviello plays many roles, and through them he has a unique view on how the information security marketplace is taking shape for 2016. Who does he see as the winners and losers?
Malware: How does it work, who built it and what - or who - is it designed to target? Answering these types of questions is a job for Marion Marschalek of Cyphort, who reverse-engineers malicious code for a living.
In his new role as DSCI's chief, Nandkumar Saravade shares details on the latest developments and initiatives at the organization, with a brief overview of the industry body's plans for the coming year.
Business email compromise attacks are becoming more sophisticated and pervasive, and smaller businesses in English-speaking countries are proving to be the most common targets, says PhishLabs' Joseph Opacki, who calls on banks to show customers examples of the schemes.
While cyberattacks will continue to menace healthcare and other business sectors next year, organizations can't afford to overlook addressing risks tied to insiders, who are responsible for most data breaches, says Michael Bruemmer of Experian Data Breach Resolution.
A lack of broad awareness of the opportunities in information security may be one of the biggest bottlenecks to capacity-building, says Dr. Ron Hale, ISACA's Chief Knowledge Officer, in this exclusive interview.
More cybersecurity specialists are making the leap from long-time careers in law enforcement, the military and the government to the private sector, says Dale Meyerrose, a retired U.S. Air Force Major General, who explains why.
The surge in data breaches has left millions of consumer records compromised. As a result, fraudsters have all they need to open bogus accounts, which cost banks huge losses linked to what Greg Shelton of LexisNexis Risk Solutions calls "sleeper fraud."
LabMD's recent victory in its long legal battle with the Federal Trade Commission will be short-lived, the medical testing lab's CEO predicts. Find out why, and what changes Michael Daugherty hopes the case will bring to FTC's enforcement practices.
CERC's head Ponnurangam Kumaraguru (PK) says industry bodies and the government should take the onus of evolving a blueprint to build the capacity of info security professionals with a well laid-out incentive program to attract new entrants.
NICE's Rodney Petersen sees too many government agencies and businesses using old-school methods to identify and recruit IT security professionals. Consequently, they often fail to build their cybersecurity staffs.