Security leaders say data science is becoming the building block of contemporary security solutions, showing great promise for developing necessary cyber defences. But where and how is data science best deployed?
Is SWIFT now playing good cop/bad cop? While it initially promised to not police the financial services industry, it's now considering training auditors and suspending banks found to have poor information security practices.
Asking how many different technologies consumers will tolerate when it comes to paying for their goods and services is a bit like asking how many more superheroes moviegoers will countenance in the latest "Avengers" film.
Cross-regional collaboration, biological cybernetics and active defense/deception technology where some of the forward-looking themes at the recent MESA event in Dubai. Here are some highlights from ground zero.
In the aftermath of a media maelstrom surrounding an alleged hack, the IRCTC flatly denies any compromise, but it's anxious to verify data in police possession, which the authorities apparently have still not shared. Here's the full lowdown.
A security firm claims to have obtained from a young Russian hacker a data set that includes 272 million unique credentials for Hotmail, Gmail and Yahoo email addresses, among others. But there's no reason to panic, security experts say.
Have you tested things before they break? Could an email be a trap? In honor of Star Wars Day, we proudly present essential cybersecurity lessons as derived from - and delivered via - the wisdom and wit of the iconic space opera.
Like last year's breach of the online dating site Ashley Madison - tagline: "Life is Short. Have an Affair." - this year's release of the "Panama Papers" is holding individuals accountable for actions which, if not always illegal, in many cases appear to have at least been unethical.
The scant - if not conflicting - details and sourcing attached to a recent news report on how the FBI cracked an iPhone 5c have left information security experts questioning both technical details and related agendas.
Behind many of the biggest breaches is a third-party intrusion. And yet far too few organizations have an effective third-party risk management program in place, says Norman Menz III, co-founder and CTO of Prevalent, in this video interview. How must they address this gap?
Increasingly, regulatory agencies are pressuring organizations to assess and attest to the cybersecurity of their business partners. In this video interview, Jay Jacobs of Bitsight Technologies discusses strategies for third-party management.
Hong Kong toymaker VTech has revised its end-user license agreement to make clear that it can't be held legally responsible for any data breaches. Many security experts have reacted with fury. But is VTech's move unusual?
The story around payment security in India is driven by the spurt of technology innovations in nontraditional payment channels that are seeing massive traction. SISA's 2016 Summit will look at innovation and the threat landscape.
"We never negotiate" might be the expectation whenever law enforcement or government agencies get targeted by criminals or even "cyberterrorists." But outside Hollywood, the reality too often turns out to be far less rigid.