The Justice Department's appeal of a court order that the government can't compel Apple to unlock an iPhone used by an accused drug dealer is significant because it sets in motion a process that could lead to a Supreme Court ruling on whether mobile device makers must give law enforcement an encryption backdoor.
A thriving market now exists to help cybercriminals recruit new talent, says Rick Holland of the threat intelligence firm Digital Shadows, which has been studying how cybercriminals advertise for new recruits - and the types of technology skills that are most in demand.
As public cloud offerings and technologies to secure them continue to mature, public cloud will increasingly feature in India's cloud story. How ready are security practitioners, and how much traction do technologies such as CASB have?
Could computing has gone from being the latest and greatest in technology innovation, to being the norm today. And security of data in the cloud is a concern that is constantly growing. WinMagic COO Mark Hickman shares challenges, advice.
The U.S. government's intrusion detection and prevention program known as Einstein has limited ability to detect breaches of federal information systems, according to a new Government Accountability Office report.
Banking institutions and associations are demanding that the Federal Financial Institutions Examination Council make significant changes to its Cybersecurity Assessment Tool. What action, if any, will regulators take in response?
Security experts say the conclusions of an inspector general's report on how the Nuclear Regulatory Commission contracts the administration of security operation centers also applies to other government agencies and private businesses.
Slamming a Ukrainian energy provider for recently falling victim to a spear-phishing email and Excel macro attack might be easy. But security experts recommend all organizations use the incident to ensure they won't fall victim to copycat attacks.
New guidance for cyber-resilience, vendor management and breach notification are expected for New York state banks in early 2016. And the tone set by these guidelines may have a ripple effect, influencing the actions of federal banking regulators.
The Reserve Bank of India is setting up an IT arm and scouting for a CEO. The leader is expected to be an IT person with skills to handle cybersecurity, IT systems audit and assessment. What qualities must this leader possess?
Vivian Poon, head of Network Security Operations at UBS, sees the need to encourage women to take up new roles in risk management, governance, security and forensics. How does she recommend recruiting these new professionals?
Indian enterprises are increasingly vulnerable to cyber fraud, according to Kroll's new Global Fraud Report. But too many of these organizations rely solely on a reactive approach to fraud, says Kroll's Reshmi Khurana.
Risk advisory firm Kroll is out with its Annual Global Fraud Report, which finds cyber risk and insider fraud rising in India. What's behind the surge, and what can organizations do to improve detection and response to all forms of fraud?
ITSERT-NP, formed to address Nepal's cybersecurity challenges, faces the task of prescribing policy guidelines and mandates, as well as establishing an information-sharing platform to secure Nepal against growing threats.
Home Minister Rajnath Singh says India is increasingly susceptible to international cyberattacks, and new barriers must be created. He also asks cybersecurity experts to be alert to online radicalization.