Nobody wants to be a cyber-attacker's first victim. But there are benefits to being second or third, says Akamai's Mike Smith. Then you get to enjoy the true benefits of the oft-discussed information sharing.
Spear phishing is going to be a leading worry for banks in 2015, as hackers increasingly target bank employees to compromise credentials used to access consumer and business accounts as well as critical servers and systems.
The Telangana state government has initiated discussions to launch a unique cybersecurity training programme for creating jobs in the state. What key elements must this programme include to be successful?
Driven by the spectre of external threats, attacks and growing business expectations, can CISOs focus on risk management and take a more integrated and systematic approach to defend against attacks?
Amidst a global information security staffing crisis, India must focus on developing more practitioners with deep technical skills. This is the practical advice from Hord Tipton, out-going director of (ISC)².
Richard Spurr has been CEO of security vendor ZixCorp for more than 10 years. How has his approach to e-mail security evolved, and how does he see evolving threats and the marketplace changing in the year ahead?
As David Shearer steps in as the new executive director of (ISC)², he inherits a huge challenge: How does the consortium respond appropriately to the global information security staffing shortage?
The latest entrant into the password "hall of shame" is Sony Pictures Entertainment. As the ongoing dumps of Sony data by Guardians of Peace highlight, Sony apparently stored unencrypted passwords with inadequate access controls.
A top-flight IT security team requires individuals with know-how in a wide range of non-technology disciplines, in addition to those with technical expertise, cybersecurity leaders say.
How can the Indian government establishment improve its cybersecurity posture? How can it meet the demand for skilled InfoSec professionals? Former NCIIPC director Muktesh Chander shares insight.
The National Institute of Standards and Technology has released a draft of guidance aimed at helping government agencies and businesses establish, participate in and maintain cyberthreat information sharing relationships.
In new guidance from the PCI Council, its leaders outline why businesses that handle card data need to address employee education. Here, experts explain why this guidance is a positive step for card security.
How relevant is ROI when demonstrating security to senior management? How seriously do Indian organizations take the practice of privacy? Sagar Karan, CISO at Fullerton India, shares his insights on these topics.
Symantec's capture the flag event puts white hat security professionals into black hat shoes to help them better understand their attackers. How did the latest participants fare? What gaps were exposed?
Sophisticated threats require advanced threat protection. A threat-focused next-generation firewall must adhere to three strategic imperatives. Learn how these imperatives improve defense against advanced threats.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.