As public cloud offerings and technologies to secure them continue to mature, public cloud will increasingly feature in India's cloud story. How ready are security practitioners, and how much traction do technologies such as CASB have?
We hear a lot about security in regulated verticals such as financial services and telecom. But what are some of the challenges unique to manufacturing? Tata Motor's CISO Uday Deshpande shares insight and recommendations.
Even as the demand for security professionals grows, the outflow of practitioners from the profession is greater than the influx of fresh blood, says (ISC)Â² CEO David Shearer. How can this trend be effectively addressed?
The Indian financial sector is at the dawn of a new age of electronic payments. What are the new form factors, and how must they be secured? An expert panel discusses the evolution and its unique security challenges.
The story around payment security in India is driven by the spurt of technology innovations in nontraditional payment channels that are seeing massive traction. SISA's 2016 Summit will look at innovation and the threat landscape.
The trend across industries is that automation results in a drastic reduction of operational job roles, even as it brings in economies of efficiency. What then does automation in security mean for the profession?
"We never negotiate" might be the expectation whenever law enforcement or government agencies get targeted by criminals or even "cyberterrorists." But outside Hollywood, the reality too often turns out to be far less rigid.
Privacy can be a true game changer for Indian enterprises in 2016. But to get there, then privacy practitioners and leaders must help ensure discussion evolves into how privacy can help organizations drive business growth.
Sometimes language barriers can be a good thing: Many malware-wielding cybercriminals have historically targeted users in North America and Europe over Japan, owing to linguistic challenges. But that's changing.
Mobility and IoT are acknowledged by security practitioners to be a whole different beast when it comes to management. MetricStream's French Caldwell says that GRC likewise needs to change its paradigm to accommodate this disruption.
CERT-In has inked a new cybersecurity agreement with Malaysia, Singapore and Japan to promote information sharing and threat detection. What challenges will these nations face, given their diverse cultures and priorities?
Three banks and a pharmaceutical company in India are reported to have been hacked by attackers who compromised IT administrators' computers using Lechiffre ransomware, demanding payment in bitcoins. How should CISOs defend against extortion?
Cybercriminals are in mourning after the shocking announcement from Oracle that it will deep-six its beloved Java Web browser plug-in technology, owing to browser makers failing to support "standards based" plug-ins.