Can U.S. law enforcement use a warrant to seize emails stored outside the U.S. by a cloud services provider? That's the question the Supreme Court has agreed to consider next year. Microsoft continues to fight an order to turn over emails stored in an Irish data center.
A discussion with ISMG Security and Technology Editor Jeremy Kirk about his chat with the cyber gang "The Dark Overlord," which threatened some U.S. school districts with extortion, leads the latest edition of the ISMG Security Report. Also, an update on surging IT security employment.
At the first of three Congressional hearings slated this week to examine the Equifax mega-breach, one Republican said of the company's delay in detecting the breach: "It's like the guards of Fort Knox forgot to lock the doors and failed to notice the thieves were emptying the vaults."
In an in-depth interview, Pavan Duggal, advocate, Supreme Court, spells out the specific steps he believes the government needs to take now that the Supreme Court has declared privacy as a fundamental right.
Top IT security and information risk experts, including former RSA Executive Chairman Art Coviello, analyze the struggles Equifax faces in the wake of a massive data breach in the latest edition of the ISMG Security Report.
The arrest of 10 men in Uttar Pradesh for allegedly cloning fingerprints of authorized Aadhaar enrollment officers is once again stirring debate over whether it's wise for India to rely so heavily on Aadhaar for authentication.
A major operation to cleanse websites of digital certificates created under questionable circumstances is underway. Google has issued the orders: Purge digital certificates that were issued by Symantec before June 1, 2016.
Lenovo will pay $3.5 million to the U.S. Federal Trade Commission and 32 states to settle a case brought against it over advertising software with serious security issues that was preinstalled on thousands of the company's laptops.
Increased digitisation and adoption of digital banking channels have led to a sharp increase in incidents of mobile fraud, enhancing the challenges for the CISOs in securing these transactions, says Subhash Subramaniam, CISO of ICICI Bank.
The ISMG Security Report leads with views on a novel way to fund the growth of the United States military's Cyber Command by seizing assets such as digital currencies from hackers and other criminals. Also, we offer tips on how to recruit scarce IT security pros.
A landmark ruling by the Supreme Court of India finds that citizens have a fundamental right to privacy. Experts weigh in on court's verdict and its implications on information security and Aadhaar ecosystem.
Researchers claim that the startup company Creditseva, which helps individuals manage credit profiles, left client data exposed, but the company says there was no "breach." Security experts discuss the security challenges faced by startup companies.
From a security perspective, moving your applications and data to AWS does not necessarily eliminate or minimize your security challenges. Regardless of their location - public, private cloud or physical data center - your applications and data are an attacker's target, and protecting them in AWS introduces the same...
Join this webinar to learn about the new Directive on Payment Services (PSD2), and the impact it has on European banks and financial service providers. This new regulation is expected to change the way we interact and consume digital banking.
Are you going to check the box? Or are you going to leverage the...