The Ukrainian energy sector is being targeted by fresh phishing attacks, the country's computer emergency response team warns. But it's not clear who's behind those campaigns, or a recent malware infection at Kiev's main airport.
Prime Minister Modi rolled out his "Start-Up India Action Plan" to encourage start-up entrepreneurs. Security leaders discuss its scope in boosting Indian cybersecurity start-ups and if there will be enough demand for their products
Security experts say the conclusions of an inspector general's report on how the Nuclear Regulatory Commission contracts the administration of security operation centers also applies to other government agencies and private businesses.
Extortion campaigns waged by cybercriminals are expected to become more damaging in 2016, putting additional pressure on CISOs to enhance protection of internal networks and educate employees about extortionists' techniques, says iSight Partner's John Miller.
Here's why the acquisition of rival threat-intelligence firm iSight Partners by breach investigation heavyweight FireEye makes sense, and why market watchers predict that other stand-alone intelligence firms will soon get snapped up.
Cyber insurance covers more than the cost of breaches of data privacy; it can play a role in protecting against the cost of a cyberattack that disrupts business operations, explains insurance specialist Tim Burke in this video interview.
While other nations are drafting and even amending their digital privacy standards, India continues to debate: Is privacy a fundamental right? J. Sai Deepak of law firm Saikrishna & Associates discusses why India must make privacy a legislative issue.
DataBreachToday announces its inaugural list of top influencers, reflecting the individuals and organizations who have the biggest impact - good or bad - on the data breach landscape and growing breach epidemic.
Aloysius Cheang of the Cloud Security Alliance says Asia is neither matured nor competent to understand the nuances of cloud security. CISOs must learn to harmonize data privacy regulations to a set of data protection principles that meet requirements.
The cyber insurance industry in Asia is heating up, with more organizations recognizing that cyber threat can in fact have crippling consequences. How will cyber insurance prove disruptive in 2016? Forcepoint's Carl Leonard shares insight
Given the rise in cyber threats, CERT-In's existing rules of empanelling IT Security auditing organizations may not comply with the new challenges. It's time to revisit these guidelines and add stringent qualifying factors for auditing.
What are the challenges when it comes to operationalizing threat intelligence feeds in the context of your business and environment? Organizations first must ensure they make best use of intelligence available internally. Arbor's Crane shares insight
Tracing bitcoin transactions, some security experts suspect multiple gangs have each amassed more than $1 billion, making them the equivalent of "unicorns" - a term venture capitalists apply to extremely successful startup firms. In case there was any doubt, cybercrime really does pay.