Here's more evidence of how a data breach can have a major financial impact. The bill for U.K. telecom giant TalkTalk's October 2015 data breach could be as much as $94 million, and the incident resulted in the loss of 95,000 customers.
Java users are being warned to only use newly released installers to avoid a nasty potential exploit. Meanwhile, a veteran bug hunter questions whether Oracle's move to ditch Java browser plug-ins will have a significant security upside.
The new EU-U.S. data transfer agreement will be called "Privacy Shield." Beyond that, however, the actual details of the agreement - and whether it will pass muster with the EU's privacy commissioners or high court - appear to be a work in progress.
Privacy can be a true game changer for Indian enterprises in 2016. But to get there, then privacy practitioners and leaders must help ensure discussion evolves into how privacy can help organizations drive business growth.
Prime Minister Modi rolled out his "Start-Up India Action Plan" to encourage start-up entrepreneurs. Security leaders discuss its scope in boosting Indian cybersecurity start-ups and if there will be enough demand for their products
Here's why the acquisition of rival threat-intelligence firm iSight Partners by breach investigation heavyweight FireEye makes sense, and why market watchers predict that other stand-alone intelligence firms will soon get snapped up.
While other nations are drafting and even amending their digital privacy standards, India continues to debate: Is privacy a fundamental right? J. Sai Deepak of law firm Saikrishna & Associates discusses why India must make privacy a legislative issue.
Reliable data specifying the number of people employed in the United States in cybersecurity field is hard to find. But one government survey shows a 5 percent increase among information security analysts in 2015.
According to sources in the industry and community, organizations are regularly getting breached and held to ransom in India. What's the story, and why are these organizations choosing to remain silent about these attacks?
Common mistakes enterprises make while prescribing a security or information assurance policy may result in big security flaws. CISOs must define security policies that are practical and enforceable, evolved through consensus with the business.
The New York Attorney General's settlement with taxi-hailing platform Uber - over alleged customer data privacy violations and a delayed data breach notification - provides a best practice security template for any organization that handles customer data.
As security leaders accept that breaches will happen despite perimeter defense and counter measures, incident response becomes an important evolution in an organization's security posture. Arbor's Jeff Buhl discusses the Asian stance and maturity.
Qatar's national cybersecurity agenda is designed to ensure that security policies help businesses strike the right balance between security and economic growth, says Khalid Al Hashmi, a top official in the Ministry of Information and Communications Technology.
As the US government enacts its Cybersecurity Information Sharing Act, the question becomes: Is India ready for such legislation? What bottlenecks await, and how effectively are public and private players engaged to tackle info-sharing challenges?