In the move to a cashless economy in India and elsewhere, improving user authentication is critical, but users are demanding ease of use, says Singapore-based Tom Wills, director at Ontrack Advisory. He describes the roles that biometrics and artificial intelligence will play.
Cory Mazzola, a cybersecurity leader at Las Vegas Sands Corp., says recruiting security pros amid a talent shortage requires putting aside expectations about degrees and backgrounds. Instead, he says companies need to be willing to develop new skills in their new hires.
Given the rise in organized cybercrime and increased online data leakage, Maharashtra Police officials are empowering officers through appropriate training, says Balsing Rajput, superintendent of police, cyber.
The ISMG Security Report leads with views on a novel way to fund the growth of the United States military's Cyber Command by seizing assets such as digital currencies from hackers and other criminals. Also, we offer tips on how to recruit scarce IT security pros.
A landmark ruling by the Supreme Court of India finds that citizens have a fundamental right to privacy. Experts weigh in on court's verdict and its implications on information security and Aadhaar ecosystem.
Hiring managers will need to get increasingly creative to find talent to fill their vacant information security positions, particularly in a shallow talent pool that is forecasted to get even thinner. Experts in the hiring trenches offer seven key tips to consider.
This monthly Security Agenda will highlight some of the most recent additions to our course library. July's edition features Greg Wilshusen on how the Government Accountability Office conducts audits. Other influencers like Robert Villanueva founder of the Cyber Threat Intelligence Division of the U.S. Secret Service,...
Most large organizations at least pay lip service to breach preparedness. But when it comes to proper policies, planning and practice, far too many still fall short, says Stuart Mort of the Australian telecommunications firm Optus. Here's what they are overlooking.
Organizations need to take a well-considered, structured approach to integrating IoT into existing information risk management processes to address security, Gartner's Ganesh Ramamoorthy explains in an in-depth interview.
Ransomware attacks are increasingly using multiple proven techniques to spread quickly and achieve the maximum impact before being thwarted. They are going to get bigger and target other platforms in the future, warns Justin Peters at Sophos APAC.
The working group set up by the ministry of finance has released its recommendations for shaping the computer emergency response team in the financial sector, prescribing an exhaustive cybersecurity framework to help organizations prevent breach incidents.
Publicis Groupe CISO Thom Langford discusses how best to measure your organization's true risk appetite and the business value of blending storytelling techniques into your security awareness programs.
Former U.S. CISO Gregory Touhill says the federal government must rethink how it hardens its workforce to prevent cyberattackers from succeeding. Organizations, he says, should regularly conduct cybersecurity exercises to help build their cyber defense.
This monthly Security Agenda will highlight some of the most recent additions to our course library. June's edition features Federal Reserve Bank of Atlanta's Payments Risk Expert, David Lott discussing mobile wallets and emerging fraud. Other industry influencers like US Bank's Mark Gelhardt, Georgia Tech Research...