As the U.S. Congress unanimously approves the Email Privacy Act, the question arises: Is India ready for such legislation? Security leaders discuss what prevents the enactment of such a law and whether law enforcement is even ready for one.
Denise Hayman, vice president at the security firm Neustar, offers in-depth advice to women interested in launching an information security career in this audio interview.
Amidst emerging technologies, CISOs must prepare to deal with a new set of challenges. And security should become a board agenda, says Vijay Subramanyam, partner with KPMG's IT Risk Consulting Practice.
Are you making the most of all the intelligence available to you today? What are the practical aspects of plugging abstract threat intelligence into your specific business use cases? Deloitte's Parthasarathy shares deeper insight.
A new study says India needs $4 billion via public-private partnership to address cybercrime challenges. Security and law enforcement experts emphasize the need for a pragmatic approach to tackle new age cybercrime.
Many APAC security practitioners have a better understanding of the big picture issues in security and new paradigms than do their counterparts in Europe, says Maurizio Garavello, VP APAC at Forcepoint.
SEBI urges commodity derivatives exchanges to put resilient cybersecurity defences in place to protect themselves from growing attacks. Security leaders say such mandates will compel senior management to increase focus on cybersecurity.
Ahmed Baig, founder of the CISO Council of UAE, says security leadership via fear, uncertainty and doubt is a thing of the past. In fact, future CISOs who use those tactics might find themselves ostracized and doomed to fail.
Even as cloud, virtualized environments and mobility continue to make the technology landscape within the enterprise more complex, it's getting harder for organizations to maintain perspective and visibility of all the pieces, says Skybox Security's EVP Stewart Fox.
A panel of experts debates the ineffectiveness of the public, private partnership model in evolving a plan to develop an ideal framework to tackle cyber threats. What is needed to build an effective model to respond to future threats?
Security leaders discuss the cyber-threat challenges facing India's critical infrastructure, including energy, manufacturing, defense and transportation. What new strategies, solutions and best practices do they suggest to respond to emerging threats?
In many enterprises, the CISO reports to the CIO, and occasionally you find a CIO who reports to the CISO. But Venafi's Tammy Moskites holds both roles. How does she manage the natural tension between IT and security?
IDRBT Director Dr. Ramasastri says enterprises find managing data breaches increasingly difficult. Assembling pieces of the puzzle - technology, solutions, skills, compliance and security - needs an effective governance structure.
Fraudsters unsuccessfully attempted to steal $80,000 (U.S.) from Indian e-commerce company Flipkart through an email spoofing scheme targeting the CFO, who thwarted the crime.
As ISMG's Data Breach Summit Asia 2016 in Bangalore wrapped up, security practitioners seemed excited to seek answers from experts on the challenges bothering them while putting a breach response plan in place.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.