While the Indian finance ministry has announced incentives for banks to curb cash transactions and encourage the use of payment cards, security experts caution CISOs about authentication and fraud risk.
Psychologically speaking, nothing beats the power of a well-timed deadline. And love it or hate it, Google's 90-day "Project Zero" deadline for fixing flaws - before they get publicly disclosed - has rewritten bug-patching rules.
In a landmark judgment, the Supreme Court of India struck down the controversial Section 66A of India's Information Technology Act, saying it violated the right to free speech as guaranteed by India's constitution.
As information sharing becomes increasingly vital in building resilient cybersecurity, FS-ISAC's Denise Anderson discusses how the Indian financial sector should put a strong collaborative structure in place.
Gujarat Forensic Sciences University aims to boost cyber-research capabilities to help practitioners address emerging cyberthreats, as well as work with industry partners to create a security research platform.
As data breaches continue to multiply, employers must not overlook how intrusions could lead to the theft of employees' identities, paving the way for fraud, says ID theft expert Johnny May. He will keynote the March 24 Fraud Summit Atlanta.
Web.com won't confirm or deny that its Register.com subsidiary, which manages more than 2 million domain names, has been breached. But a news report claims the FBI is investigating a year-old intrusion.
Singapore's Personal Data Protection Commission has formed an advisory committee to prescribe guidance for the Data Protection Act. Security experts set the agenda and suggest suitable protection measures.
Recent fraud cases in India have bagged hefty compensation for victims and may signal a shifting of legal liability to organizations. Prashant Mali, an attorney who won these judgments, shares insights on the implications.
When Todd Davis helped found LifeLock in 2005, ID fraud was a niche consumer issue. Today it's a major enterprise risk. What are today's top fraud threats, and where are some of the surprising security gaps?