Demonstrating the return on security investment and getting management buy-in remain some of the less glamorous, but very real challenges faced by Indian CISOs, says Shivkumar Pandey of the Bombay Stock Exchange.
Narayan Neelakantan, outgoing CISO at the National Stock Exchange of India, is concerned that the lack of capacity in incident response is going to haunt Indian organizations in the near future. He shares insight on IR maturity and the imminent need.
Security is moving fast, but is still playing a catch-up game with technology. In this scenario, age-old paradigms need to be revised to remain relevant, says Oracle's security lead for APAC, Chris Pickett
Singapore is considering data privacy and protection legislation soon, owing to strong support from the industry's data privacy and protection leaders. The government seems to be studying EU's General Data Protection Regulation closely to incorporate some elements.
Cross-regional collaboration, biological cybernetics and active defense/deception technology where some of the forward-looking themes at the recent MESA event in Dubai. Here are some highlights from ground zero.
Cyber security breaches are more common now than they have ever been. While they don't all make news headlines,
they affect numerous businesses every single day.
What exactly are these threats? How are they carried out and how can they impact business?
Download this guide to explore the top five most common...
Cyberattacks are increasing in frequency, complexity, nuance and stealth. But human error, business compulsions and increasingly complex environments make it difficult to maintain adequate defenses, says Juniper Network's CTO for India and SAARC
The $940 billion compensation awarded to Epic Systems in its case against Indian IT major TCS is unprecedented - shaking the industry out of its complacency to information security. Cyber law expert "Naavi" takes a close look at the implications for India.
The SWIFT messaging platform, which was hacked during the Bangladesh Bank heist, is used widely by most Indian banks for international financial transactions. Institutions that rely on the platform must be more vigilant, experts warn.
Traffic from command-and-control (C2) servers
is an indication of attack risk or compromise
potential. Tracking live C2 data reveals victim
hotspots and activity hubs for malicious actors.
Level 3 has a point of presence (PoP) in more
than 30 European countries and continually
monitors Internet traffic for...
Are you making the most of all the intelligence available to you today? What are the practical aspects of plugging abstract threat intelligence into your specific business use cases? Deloitte's Parthasarathy shares deeper insight.
A new study says India needs $4 billion via public-private partnership to address cybercrime challenges. Security and law enforcement experts emphasize the need for a pragmatic approach to tackle new age cybercrime.
Vikrant Varshney of Risk Resources believes cyber threats are a concern of every individual, every organization who thought IT is just a system. A collaborative approach in building awareness is acute to fight this cyberwar, he says.
nullcon has made a name for itself with its forward-looking philosophy - "The Next Security Thing!" We take a look at some of the hot sessions and events slated to take place at the security marathon this year.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.