Cyber insurance covers more than the cost of breaches of data privacy; it can play a role in protecting against the cost of a cyberattack that disrupts business operations, explains insurance specialist Tim Burke in this video interview.
While other nations are drafting and even amending their digital privacy standards, India continues to debate: Is privacy a fundamental right? J. Sai Deepak of law firm Saikrishna & Associates discusses why India must make privacy a legislative issue.
DataBreachToday announces its inaugural list of top influencers, reflecting the individuals and organizations who have the biggest impact - good or bad - on the data breach landscape and growing breach epidemic.
Aloysius Cheang of the Cloud Security Alliance says Asia is neither matured nor competent to understand the nuances of cloud security. CISOs must learn to harmonize data privacy regulations to a set of data protection principles that meet requirements.
The cyber insurance industry in Asia is heating up, with more organizations recognizing that cyber threat can in fact have crippling consequences. How will cyber insurance prove disruptive in 2016? Forcepoint's Carl Leonard shares insight
Given the rise in cyber threats, CERT-In's existing rules of empanelling IT Security auditing organizations may not comply with the new challenges. It's time to revisit these guidelines and add stringent qualifying factors for auditing.
What are the challenges when it comes to operationalizing threat intelligence feeds in the context of your business and environment? Organizations first must ensure they make best use of intelligence available internally. Arbor's Crane shares insight
Tracing bitcoin transactions, some security experts suspect multiple gangs have each amassed more than $1 billion, making them the equivalent of "unicorns" - a term venture capitalists apply to extremely successful startup firms. In case there was any doubt, cybercrime really does pay.
The Maharashtra government has appointed senior IPS officer and IT expert Brijesh Singh as Special IG-Cybercrime. Experts analyze expectations for the new head and discuss what should be his agenda for tackling cybercrime.
Networking vendor Fortinet refutes a researcher's assertions that there is an SSH "backdoor" in the FortiOS firmware that runs its devices. Many experts say that while the patched flaw looks unintentional, it might still serve as a backdoor.
The discovery of a serious remote code execution flaw in Trend Micro's consumer security software - now patched - is a reminder that even security software has code-level flaws. But shouldn't security vendors be held to a higher standard than others?
As Art Gilliland, CEO of Skyport Systems, assesses cybersecurity in 2016, he sees distinct strengths, weakness and opportunities for the next generation of leaders. The question is: Where will we find these leaders?