Blue Coat CTO Dr. Hugh Thompson speaks about the future of security, the constants that need attention, and lessons to be learned from the U.S. when it comes to writing meaningful breach notification laws.
In a security landscape where the frenetic pace of technology has changed paradigms in ways organizations are struggling to cope with, Blue Coat's Hugh Thompson advises adopting a 'Degrees of Freedom' approach.
The new barcode-based passbook printing kiosk adopted by leading banks is now said to contain security flaws that could result in data leakage. What is the vulnerability, and how can it be mitigated?
In the wake of the APT30 report's revelations, FireEye's Ranndeep Chonker talks about the Indian government's approach to information security and its primary challenges in dealing with APT types of attacks.
The Telangana government is taking steps to address the state's cybersecurity skills shortage. See its emerging plans to align with academia and industry bodies to build partnerships and new capacities.
Given that hacking is an everyday threat to most organizations, reliable security depends on understanding the exposure, weaknesses and threats that could lead to a breach in the defences, says PWC's Wouter Veugelen.
What does an organization do when it cannot afford to fund a full-time C-level security leader? Enter the virtual CISO, a growing service offering in India. Experts discuss the business value and benefits.
After hosting the ISACA Mumbai Chapter Conference back in 2013, I was asked again this year, and didn't think twice. Here are some of my observations from two days of talking security with key thought-leaders.
In the face of new cyber-attacks, enterprises must deploy new security intelligence platforms with analytics to gain greater visibility and reduce incident response time, says LogRhythm's Taylor-Mountford.
Just how prepared are Japanese entities for dealing with the risks from targeted attacks? What are the unique considerations and the maturity level? Trend Micro's Masayoshi Someya shares his perspective.
RSA Conference Asia Pacific and Japan starts July 22, and ISMG will be reporting to you from the conference floor. Here is our selection of some of the hottest sessions from the event agenda.
Antrix becomes the latest in a long line of government agencies that have been hacked or defaced. What lessons can be learned from this incident, and how must agencies improve their cybersecurity posture?
As India goes through digital transformation under PM Modi's initiative, it will create an increasingly large attack surface for cyber criminals. Security leaders discuss best practices to combat emerging threats.
As part of the Digital India initiative, NIELT has taken up capacity building and skilling of 12,050 security professionals. But security leaders say a systematic approach to address the skills shortage is lacking.
In global business, operating under multiple jurisdictions and regulations helps build the case for governance, risk and compliance solutions. But there is more to GRC than meets the eye, says MetricStream's French Caldwell.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.