The U.S. and China, as part of a cybersecurity agreement, have agreed not to conduct or knowingly support cyber-enabled theft of intellectual property with the intent of providing competitive advantages to companies or commercial sectors.
The cyber expert panel formed by the ministry of Home Affairs late last year came up with its plan to tackle cybercrime in India. Security experts recommend that the ministry focus on state-level skill development.
The severity of the U.S. Office of Personnel Management breach continues to grow, with investigators now reporting that hackers stolen 5.6 million people's fingerprint data. The theft may have security implications well into the future.
As the Indian economy pushes closer to realizing the promise of initiatives such as Digital India, the momentum is causing a strategic paradigm shift in the approach to cybersecurity. DSCI's Vinayak Godse shares observations.
The number of apps infected in the first large-scale Apple App Store malware outbreak is far higher than was first believed, according to the cybersecurity firm FireEye, which reports that at least 4,000 apps were infected with XcodeGhost malware.
Security experts say digital transformation demands that enterprise leaders look beyond compliance to understand business needs. This drives the need for a managed services model to understand and map enterprise risks.
Amid some controversy, a national encryption policy draft was withdrawn by the Indian government within days of its release for public comment. Security experts say the draft reflects a lack of clarity and needs more work.
Responding to U.S. government criticism of China over its persistent online economic espionage campaigns, Chinese President Xi Jinping says that the Chinese government does not hack other nations, or support Chinese companies that do so, and calls for those responsible for cyberattacks to be prosecuted.
Mobile computing remains a challenge for many enterprises - with an unprecedented explosion of devices and applications. Understanding diversity, avoiding uncertainty and planning ahead are some suggestions from Gartner's John Girard.
For years, information security experts have been warning users to create complex, unique passwords, and organizations to secure them properly. But an analysis of 12 million cracked Ashley Madison passwords shows how much we're still failing.
The act of prevention is dead. The new mandate for CISOs is to quickly detect anomalous behavior in the networks to be able to respond quickly to breaches and combat threats, says RSA's director, Kartik Shahani.
Increasingly, as enterprise leaders plan security investments, they think not just about threats and technology, but also how to tie their decisions to business performance. Gartner's Sid Deshpande explains the shift.
President Obama characterizes hacks of American businesses by Chinese hackers as an "act of aggression" against the United States and promises his administration will take action against the Chinese if they don't stop.
The human element has been referred to as the weakest link in the security chain. Do advances in applying analytics to human behavior hold the key to reducing risks?
India and Russia are discussing an 'expert group' on cybersecurity to jointly counter terrorism from ISIS. However, cyber experts express skepticism, saying it's an unrealistic move by India.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.