The Equation Group leak revealed a zero-day flaw in Cisco's firewall software - a patch is being prepped - as well as a vulnerability in Fortinet's software that's since been patched. Has the U.S. government long known about the flaws?
Sam Lodhi, director at niche services firm IBRS, speaks about adapting biological cybernetics to help management understand information security risk better and how cybernetics can be applied to other verticals.
SWIFT screwed up. That's the takeaway from a new report into the Brussels-based cooperative, which alleges that the organization overlooked serious concerns relating to smaller banks' security and the risks they posed to the health of its entire network.
Vikrant Arora, CISO of NYC Health & Hospitals, offers the four most important questions a board must ask the CISO to get a good understanding of how the organization is addressing top cybersecurity concerns.
It's easy to look at the payments landscape and see only the flaws. But payment card security has come a long way in the past 10 years, thanks in large part to the PCI Data Security Standard. How will card security be refined in the coming decade?
Ransomware and extortion are among the threats that have successfully transitioned from an original B2C business model to targeting enterprises. Trend Mirco's Myla Pilao shares insight on this and other attack trends in Asia.
To facilitate faster decision-making, better cost control and increased transparency, many organizations now task a single executive to oversee all security, privacy and risk functions, says ADP's Roland Cloutier.
Do you have $100,000 burning a hole in your pocket and an abiding love of bitcoins? If so, then the U.S. Marshals Service has an offer you can't refuse: Bid on bitcoins seized in some high-profile investigations, including the Silk Road takedown.
Business email compromise scams have caused billions in losses. An inside look at one Nigeria-based group shows a surprising profile of the threat actors.
CISOs in India will not be able to develop mature information security programs until they address the formidable challenge of gaining the support of senior management, says Manoj Sarangi, vice president and CISO at HCL Technologies, an IT services company.
CREST is launching a chapter in Singapore - its first chapter in Asia - to offer information security professionals certification and accreditation in penetration testing. It plans to eventually offer other certifications as well.
A new survey shows 82 percent of organizations around the world are struggling with a shortage of staff with cybersecurity skills. Training expert Simone Petrella analyzes the survey results and spotlights the skills needed now to fight emerging cyber threats.
Imagine the security implications of a world in which millions of people have a physical impairment that leaves them internet-connected. Say hello to the promise - and peril - of internet-connected hearing aids, says Global Cyber Alliance's Phil Reitinger.
As more women make forays into the business landscape in the Middle East, some are beginning to build careers in IT and information security. But it's still by no means easy for women to break into security careers in the region, says Abeer Khedr, director of information security at National Bank of Egypt.
Ransomware gangs are employing "customer service" agents to field victims' queries in an attempt to maximize their illicit profits, according to security firm F-Secure, which describes the encounters of someone posing as a victim.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.