Key stakeholders representing international legal and security experts discuss strategies and frameworks to establish a cybersecure ecosystem and jurisprudence against growing threats and attacks. What is needed for them to succeed?
Discussions I recently moderated around mobile security indicate that Indian practitioners have significant doubts about the effectiveness and applicability of mobile security solutions such as MDM and others.
The upcoming International Conference on Cyber Law, Cyber Crime & Cybersecurity 2015 in New Delhi will see thought-leaders examine some of the vital aspects regarding evolving jurisprudence concerning cyber eco-space.
The Irish Reporting and Information Security Service's IRISSCON Cyber Crime Conference is due to touch on DDoS, fraud, breach response, malware, social engineering, the Paris terror attacks and more.
With growing risks of data breaches, Indian security leaders say it is critical to bring the new dangers of unreported breaches to the notice of practitioners at large. What will it take to spur such action?
Apple has removed hundreds of apps from its App Store for violating its user-tracking guidelines. Chinese mobile advertising firm Youmi has issued "sincere apologies" for the tracking behavior and promised to compensate affected developers.
As a result of Experian's data breach, 15 million T-Mobile subscribers are at risk from phishing attacks and fraud. But it's not clear what more T-Mobile can do to protect breach victims, says security specialist Mark James.
In addition to having a dedicated individual or team responsible for privacy matters, organizations must ensure their information security and IT staffs are knowledgeable about data privacy issues, says Trevor Hughes, CEO of the International Association of Privacy Professionals.
The cyber expert panel formed by the ministry of Home Affairs late last year came up with its plan to tackle cybercrime in India. Security experts recommend that the ministry focus on state-level skill development.
As the Indian economy pushes closer to realizing the promise of initiatives such as Digital India, the momentum is causing a strategic paradigm shift in the approach to cybersecurity. DSCI's Vinayak Godse shares observations.
Security experts say digital transformation demands that enterprise leaders look beyond compliance to understand business needs. This drives the need for a managed services model to understand and map enterprise risks.
Mobile computing remains a challenge for many enterprises - with an unprecedented explosion of devices and applications. Understanding diversity, avoiding uncertainty and planning ahead are some suggestions from Gartner's John Girard.
KK Mookhey has been keyed into the field of Information Security in India for over the last 14 years. He shares his insights on the emerging trends in Indian security today and the major milestones which transformed the sector.
With automation and the increasing economic feasibility of launching targeted attacks on a small scale, tier-II and III organizations housing data need to start getting concerned, says Gartner's Ahlm.
Singapore's leading privacy experts debate the merits of mandatory disclosure of data breaches. Should breach notification be a regulatory requirement when critical data is compromised or at risk?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.