Here's why the acquisition of rival threat-intelligence firm iSight Partners by breach investigation heavyweight FireEye makes sense, and why market watchers predict that other stand-alone intelligence firms will soon get snapped up.
Aloysius Cheang of the Cloud Security Alliance says Asia is neither matured nor competent to understand the nuances of cloud security. CISOs must learn to harmonize data privacy regulations to a set of data protection principles that meet requirements.
Common mistakes enterprises make while prescribing a security or information assurance policy may result in big security flaws. CISOs must define security policies that are practical and enforceable, evolved through consensus with the business.
Turns out electronic learning products can be bad for children's privacy - and for their parents too. The VTech breach highlights how, despite repeated warnings, too many manufacturers continue to not take security seriously.
Ireland's Cyber Crime Conference in Dublin drew a capacity crowd for a full day of security briefings, networking, hotly contested capture-the-flag and secure-coding challenges, as well as a chance to sharpen one's lock-picking skills.
Symantec new Advanced Threat Protection solution aims at consolidating its key security offerings to enable organizations to remediate advanced threats effectively. Symantec's Kaura shares details, strategy in an interview.
Cloud Access Security Brokers are the flavor of the season in cloud security. The value proposition is immense - enabling the enterprise to extend and enforce policies beyond the perimeter effectively. Let's take a closer look.
As the Indian economy pushes closer to realizing the promise of initiatives such as Digital India, the momentum is causing a strategic paradigm shift in the approach to cybersecurity. DSCI's Vinayak Godse shares observations.
Security experts say digital transformation demands that enterprise leaders look beyond compliance to understand business needs. This drives the need for a managed services model to understand and map enterprise risks.
Blue Coat CTO Dr. Hugh Thompson speaks about the future of security, the constants that need attention, and lessons to be learned from the U.S. when it comes to writing meaningful breach notification laws.
Thou shalt not reverse engineer Oracle's products. That was the stunning diktat issued by Oracle CSO Mary Ann Davidson in a blog post that some are reading as a declaration of war against the security research community.
Prime Minister Modi's 'Digital India Week' is an initiative to end corruption through digitization of processes. Security experts say success depends on the security platforms through which services are delivered.