Discussions I recently moderated around mobile security indicate that Indian practitioners have significant doubts about the effectiveness and applicability of mobile security solutions such as MDM and others.
To adequately protect their data, organizations need to go far beyond traditional controls and implement a "data-centric security" approach, says Informatica's Robert Shields, who describes the essential elements of the strategy.
The National Institute of Standards and Technology has issued a Guide to Application Whitelisting that provides step-by-step instructions on deploying automated application whitelisting to help prevent malware from accessing IT systems.
To build a resilient and secure enterprise, security leaders must take a risk-based approach and build the capabilities to understand the risk appetite of the organisation, says Gartner's Tom Scholtz.
The act of prevention is dead. The new mandate for CISOs is to quickly detect anomalous behavior in the networks to be able to respond quickly to breaches and combat threats, says RSA's director, Kartik Shahani.
A burgeoning security infrastructure means the headache of management, enforcement and optimization. How do you efficiently administrate it? How do you plan policy enforcement at scale? Juniper's Paul shares insight.
With enterprises increasingly concerned about advanced persistent threats, ISMG speaks to experts for recommendations on building APT resilience in their organizations - both immediate and long-term.
Because of commercial and governmental pressure to increase the use of electronic banking, cybersecurity risk is now the biggest challenge facing Singapore's financial institutions, says Lena NG of Clifford Chance.
Beyond APT30, another advanced threat group appears to be at work in India and the SEA region, targeting critical information assets. However, APT resiliency is not yet a part of the security lexicon, experts say.
Put your personal feelings aside; what's dangerous about the AshleyMadison.com breach is that ideologists will now go beyond taking down an IT system and actually destroy a business. This evolution, says cybersecurity expert Carl Herberger, requires a new way to assess and mitigate risk.
India has yet to experience a data breach on the scale of Sony or Home Depot. But the market is growing, and so are breach risks, says Kroll's Reshmi Khurana. How must security leaders prepare their organizations?
Wipro has developed a fraud detection model for improved risk management using big data analytics. Can CISOs leverage it to reduce risk, enhance process efficiency and refine fraud detection algorithms?
EdgeWave's Mike Walls, a former bomber pilot who led Navy red teams, says penetration testing is useful in analyzing bits and bytes but not the readiness of operations under attack from cyberspace. Red teams, he says, can analyze the impact on operations.
The alleged hack on Ola Cabs comes just months after AppSec experts called out Ola's Mobile app for security lapses. We take a closer look at the compromise with some expert help.
In the face of advanced threats, security leaders must first understand their attackers' strategies and tactics. Jim Jaeger of Fidelis offers keen security insight into new security tools and methods.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.