A potentially explosive story suggests that there were secret communications between Russia and U.S. presidential candidate Donald Trump's business. But computer security experts have dismissed the report, saying it's based on a flawed interpretation of technical information.
The Securities and Exchange Board of India is scouting for a CISO to oversee various initiatives aimed at protecting the securities marketplace from cyber threats. Security leaders offer suggestions for what should be on the CISO's to-do list.
In light of the increase in ATM fraud in India, it's essential that banks more closely monitor the security efforts of third-party service providers they increasingly are relying on to help manage their networks, says Prakash Joshi, COO at Electronic Payment Systems
Apple's security defenses have improved dramatically in recent years, but poorly written drivers in third-party applications could provide key access to critical parts of macOS.
Although India lacks a national mandate on reporting all data breaches to authorities and notifying victims, some larger banks have been reporting security breaches to the RBI - a hopeful sign.
There are two Yahoo conspiracy theories: It was hacked by a "state-sponsored actor," and it disabled email forwarding to prevent a post-breach exodus. Although neither scenario appears to be true, that doesn't mean the badly breached search giant is in the clear.
In an interview, former U.S. government cybersecurity official Mark Weatherford discusses why the desire to obtain cybersecurity insurance could be a strong catalyst for Asian enterprises to take security more seriously.
Yahoo is appealing to the U.S. director of national intelligence to declassify an order that allegedly required the company to install secret spying software that scanned incoming email accounts for specific content.
Yahoo, now negotiating its sale to Verizon, has posted an increase in quarterly profits and page views, bolstering its case that its massive data breach didn't irrevocably damage its value. But with ad revenues in decline, time is running out.
Some security experts say the Singapore Cyber Security Agency's new strategic blueprint for creating a resilient and trusted cyber environment lacks a practical approach to addressing key risk issues.
Understanding the difference between cybersecurity crisis management and security incident response could be critical to your organization's survival. In this blog, a CISO offers insights on creating an effective crisis management plan.
Ongoing talks between the U.S. and India regarding cybersecurity issues have yet to result in significant action by the Indian government. When will India start making progress in developing an effective cybersecurity model?
While the banking industry in India has achieved some security maturity, India Post will be starting from scratch as it launches India Post Payments Bank. But the new bank will have the opportunity to build security into its infrastructure and processes, rather than bolting it on later.
In a rare case of potential breach accountability, Verizon is reportedly demanding a $1 billion discount to acquire Yahoo as a result of the search giant's failure to more rapidly spot a data breach that compromised at least 500 million users' accounts.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.