(ISC)² 's recent global workforce study finds the number of Infosec women as a percent in GRC roles has doubled. Female security practitioners endorse the view, saying women, by nature, are better risk managers.
A curious case of fraud has come to light at Kotak Mahindra Bank, where fraudsters misused credit cards that the bank says it never issued. What will investigations reveal about how fraudsters accessed this data? Who is liable?
To build a resilient and secure enterprise, security leaders must take a risk-based approach and build the capabilities to understand the risk appetite of the organisation, says Gartner's Tom Scholtz.
Security leaders must embrace new approaches to digital business in managing and mitigating enterprise risk. This was the key theme of Gartner's Security and Risk Management Summit - the first of its kind for India.
The new barcode-based passbook printing kiosk adopted by leading banks is now said to contain security flaws that could result in data leakage. What is the vulnerability, and how can it be mitigated?
Antrix becomes the latest in a long line of government agencies that have been hacked or defaced. What lessons can be learned from this incident, and how must agencies improve their cybersecurity posture?
In global business, operating under multiple jurisdictions and regulations helps build the case for governance, risk and compliance solutions. But there is more to GRC than meets the eye, says MetricStream's French Caldwell.
Fortinet's annual Security Census 2015 reports that APJ CISOs faced major vulnerabilities in 2015 via unsecured wireless networks. Experts advise on protection methods for wireless networks.
India's burgeoning mobile penetration has led to a massive uptake in app usage. Frenetic development to meet demand has found security ignored. Dhananjay Rokde discusses how this ecosystem functions today.
Wipro has developed a fraud detection model for improved risk management using big data analytics. Can CISOs leverage it to reduce risk, enhance process efficiency and refine fraud detection algorithms?
With large swatches of rural India preparing to go online, new Internet users, who are using devices other than PCs, need to be educated about the risks, says cybersecurity analyst Jiten Jain, CEO of the InfoSec Consortium.
Mobile app-based ecommerce is surging forward in India's smartphone-saturated market. After Meru Cabs' data exposure earlier in May, security experts analyze legal liability, secure development & incident response.
In an application-driven economy, are security leaders paying enough attention to application-level security? OWASP's Dhruv Soi speaks on how to ensure security in the application development lifecycle.
When security succeeds, it is often unnoticed. That success might also make security investments hard to sustain, given its low profile in organizations. Gartner's Tom Scholtz discusses articulating security's business value.
The pharmaceutical industry is data-rich, and CISOs of the sector face a huge challenge in protecting its intellectual property. GlaxoSmithkline's Steve Williamson offers tips for securing the data lifecycle.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.