IT security is amidst a seismic transformation, and the evolution requires a particular set of technologies and skills. In this interview, Greg Bell of KPMG offers insights on how security leaders can prepare for change.
The complexity of cybersecurity creates new headaches for organizations, says John Peterson of Comodo. The cure? Specialized threat analysis and protection. In this video interview, Peterson discusses how to implement this new model.
After a long career in the Secret Service, Steven Bullitt has joined Solutionary as its new vice president of cyber forensics and investigations. In this video interview, he explains the new perspective he brings to cybercrime defense and investigations.
Avivah Litan, Art Coviello, Raj Samani. These are among the thought leaders who were to meet with ISMG's editors at the RSA Conference on Wednesday. Editors Tom Field, Tracy Kitten and Mathew Schwartz offer an RSA preview.
The "industrialization" of cybercrime, remote-access attacks and mobile-banking application and online-browser overlay attacks are trends the financial industry should monitor this year, says George Tubin of IBM Security Trusteer.
It's springtime in San Francisco: cue the annual RSA Conference. Here are some notable trends that have already emerged from the event, ranging from ransomware and phishing attacks to hacker self-promotion and Facebook fakery.
As the first day of RSA Conference 2016 sessions wrapped up, ISMG's editorial team sat down to discuss their takeaways from sessions and interviews. Editors Tom Field, Tracy Kitten and Mathew Schwartz offer an RSA review.
As the first day of RSA Conference 2016 sessions was set to start, ISMG's editorial team sat down to discuss the event and what to expect from it. Editors Tom Field, Tracy Kitten and Mathew Schwartz offer an RSA preview in this video report.
The Government of India will partner with the Maharashtra Police to train cybersecurity professionals to tackle cybercrime. NIELIT will take up the task of imparting cybersecurity and forensic training to nearly 60,000 personnel.
Too many companies that provide cybersecurity solutions are failing to focus on helping organizations control risk at a reasonable cost, argues Malcolm Harkins, CISO at Cylance.
A federal magistrate in Brooklyn, N.Y., unlike another judge in California, has denied a request by federal authorities to force Apple to retrieve data from an iPhone, this time in a New York narcotics case.
To the list of vulnerable, Internet-connected devices - from routers and home alarms to baby monitors and toys - now add the world's most popular electric car: the Nissan LEAF. Nissan says a full fix is forthcoming.
It's been just over a year since health plan Anthem Inc. reported a record-breaking hacker attack affecting nearly 79 million individuals. A number of key lessons have emerged from that breach that other organizations can apply to improve their own data security.
With the Apple-FBI legal battle underway - plus rising worries over cybercrime, the Internet of Things and more - there's plenty to discuss, debate and learn at RSA Conference 2016 in San Francisco.
As public cloud offerings and technologies to secure them continue to mature, public cloud will increasingly feature in India's cloud story. How ready are security practitioners, and how much traction do technologies such as CASB have?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.