The Chinese government concedes the attack on U.S. Office of Personnel Management computers emanated from China, but it contends the culprits were criminals, not individuals working for the Chinese government or military. Some experts in the United States aren't buying the Chinese government's explanation.
India's and Malaysia's cybersecurity teams look to strike a chord to collaborate and share best security practices to respond to security incidents. But the question is: Who will take the lead and has the expertise to face the challenges?
The security of Internet-connected toys is in the limelight after toymaker VTech acknowledged suffering a data breach that affects 5 million accounts and personal information and photographs relating to more than 200,000 children.
In his new role as DSCI's chief, Nandkumar Saravade shares details on the latest developments and initiatives at the organization, with a brief overview of the industry body's plans for the coming year.
As the U.S. moves toward faster payments, it must include new payments providers, such as Apple Pay and Square, as well as banks in all efforts to ensure security, says David Lott of the Federal Reserve Bank of Atlanta.
India and Singapore signed a MoU to tackle cybersecurity challenges by setting up an incident prevention and response mechanism, which is operationally ready, as well as establishing an information sharing mechanism for best practices.
While cyberattacks will continue to menace healthcare and other business sectors next year, organizations can't afford to overlook addressing risks tied to insiders, who are responsible for most data breaches, says Michael Bruemmer of Experian Data Breach Resolution.
Business email compromise attacks are becoming more sophisticated and pervasive, and smaller businesses in English-speaking countries are proving to be the most common targets, says PhishLabs' Joseph Opacki, who calls on banks to show customers examples of the schemes.
Risk advisory firm Kroll is out with its Annual Global Fraud Report, which finds cyber risk and insider fraud rising in India. What's behind the surge, and what can organizations do to improve detection and response to all forms of fraud?
Ireland's Cyber Crime Conference in Dublin drew a capacity crowd for a full day of security briefings, networking, hotly contested capture-the-flag and secure-coding challenges, as well as a chance to sharpen one's lock-picking skills.
TalkTalk's confusion in the wake of its recent data breach, as well as mangling of technical details and failure to encrypt customer data, demonstrate the importance of having an incident-response plan ready in advance of any breach, experts say.
The FBI is pursuing a suspected Russian hacker who reportedly amassed a trove of 1.2 billion stolen online credentials, plus payment card data and Social Security numbers, and who's offered access to hacked Facebook and Twitter accounts.
ITSERT-NP, formed to address Nepal's cybersecurity challenges, faces the task of prescribing policy guidelines and mandates, as well as establishing an information-sharing platform to secure Nepal against growing threats.
A lack of broad awareness of the opportunities in information security may be one of the biggest bottlenecks to capacity-building, says Dr. Ron Hale, ISACA's Chief Knowledge Officer, in this exclusive interview.
More cybersecurity specialists are making the leap from long-time careers in law enforcement, the military and the government to the private sector, says Dale Meyerrose, a retired U.S. Air Force Major General, who explains why.