A quiet life in retirement? Not for Art Coviello, former executive chairman of RSA. He's just joined the boards of two new security ventures, Bugcrowd and Cylance, and he's got big ideas for how to influence the 2016 cybersecurity agenda.
Many CEOs and boards of directors are failing their companies by not truly understanding their cybersecurity risks, says Steve Durbin of the Information Security Forum. He stresses that senior leaders must ensure their organizations provide adequate funding to manage risks.
Mergers and acquisitions create challenges for CISOs, including allocating resources to meet the information security needs of newly united companies, says Joey Johnson, CISO of Premise Health.
The recent data breach at U.K.-based telecom company TalkTalk illustrates that breach risk mitigation is a critical issue worldwide. PCI's Jeremy King, who will be a featured speaker at ISMG's Fraud Summit London on Oct. 27, explains why European data security is getting more scrutiny.
Although cybesercurity awareness is growing in India, the nation is not making all the right moves, says Dinesh Bareja of the OpenSecurity Alliance and India Watch. Even as threats evolve and multiply, old challenges remain and are making themselves more keenly felt, he argues.
Building a strong platform to secure enterprise email systems is like piecing together a puzzle by joining existing technologies from various sources. NIST is readying a guide to do just that.
Dr. A S Ramasastri, IDRBT's director, says the enterprise security leader's office needs to be strengthened and empowered to tackle new threats and growing cyber espionage with an appropriate risk-based strategy.
The information security field has done a poor job of attracting and retaining women, contends Jo Stewart-Rattray, international director of ISACA, who emphasizes the need for mentoring as well as salary equity.
Potomac Institute's Melissa Hathaway suggests that Modi's Digital India should define security strategy in economic terms, and should include best practices from different nations to build a resilient cyber defense.
Trend Micro's Q2 Security roundup report indicates that existing attack vectors are getting starker, even as cybercrime is getting more commoditized. Myla Pilao shares key insight on the landscape in the region.
With organizations increasingly moving to the cloud, more security professionals are needed to help secure those environments as well as manage incident response. Cloud forensics expert Neha Thethi outlines must-have skills, qualifications and certifications.
Gartner research director Craig Lawson discusses three waves of threat intelligence services that can be leveraged by enterprises in building a threat detection model, while emphasizing what is driving the third wave.
The commoditization of attack infrastructure and services in the cyber-criminal underground, and the low cost and ease of launching targeted attacks, are growing concerns that require new defense strategies, says Trend Micro's Raimund Genes.
In addition to having a dedicated individual or team responsible for privacy matters, organizations must ensure their information security and IT staffs are knowledgeable about data privacy issues, says Trevor Hughes, CEO of the International Association of Privacy Professionals.
To build a resilient and secure enterprise, security leaders must take a risk-based approach and build the capabilities to understand the risk appetite of the organisation, says Gartner's Tom Scholtz.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.