TalkTalk's confusion in the wake of its recent data breach, as well as mangling of technical details and failure to encrypt customer data, demonstrate the importance of having an incident-response plan ready in advance of any breach, experts say.
LabMD's recent victory in its long legal battle with the Federal Trade Commission will be short-lived, the medical testing lab's CEO predicts. Find out why, and what changes Michael Daugherty hopes the case will bring to FTC's enforcement practices.
Discussions I recently moderated around mobile security indicate that Indian practitioners have significant doubts about the effectiveness and applicability of mobile security solutions such as MDM and others.
The Irish Reporting and Information Security Service's IRISSCON Cyber Crime Conference is due to touch on DDoS, fraud, breach response, malware, social engineering, the Paris terror attacks and more.
Home Minister Rajnath Singh says India is increasingly susceptible to international cyberattacks, and new barriers must be created. He also asks cybersecurity experts to be alert to online radicalization.
Technology is increasingly driving business, and security needs to become an intrinsic part of this equation. In an age where speed-to-market underpins success, security cannot be seen as an impediment, says Deloitte's Viswanathan.
U.S. authorities have indicted three men for their alleged involvement in a massive cyberattack scheme that affected JPMorgan Chase and 11 other U.S. banks and financial services corporations.
India's cybersecurity co-ordinator, Dr Gulshan Rai, finds the cyber world becoming more complex with growth in interconnected devices and emphasizes a multi-stakeholder approach in building a cybersecure nation.
Financial crimes are growing in frequency and complexity with advances in technology providing malicious insiders and organized criminals more opportunity to commit crimes. Furthermore, the drumbeat to remain compliant continues. New regulatory guidelines continue to arise with increased scrutiny and complexity, so...
Brijesh Singh, CISO for the state of Maharashtra and IG of CID, says that the threat is evolving in such a manner that it is impossible for law enforcement alone to tackle it. "All of our traditional models of policing, they don't work here."
Security may be doomed to remain misunderstood and perceived as a business hurdle if it continues to speak technology. Security needs to speak the language of risk to the business, argues Dr. Siva Subramaniam, Global CISO Bharti Airtel.
Mergers and acquisitions create challenges for CISOs, including allocating resources to meet the information security needs of newly united companies, says Joey Johnson, CISO of Premise Health.
(ISC)² 's recent global workforce study finds the number of Infosec women as a percent in GRC roles has doubled. Female security practitioners endorse the view, saying women, by nature, are better risk managers.
The recent data breach at U.K.-based telecom company TalkTalk illustrates that breach risk mitigation is a critical issue worldwide. PCI's Jeremy King, who will be a featured speaker at ISMG's Fraud Summit London on Oct. 27, explains why European data security is getting more scrutiny.
Cloud Access Security Brokers are the flavor of the season in cloud security. The value proposition is immense - enabling the enterprise to extend and enforce policies beyond the perimeter effectively. Let's take a closer look.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.