Potomac Institute's Melissa Hathaway suggests that Modi's Digital India should define security strategy in economic terms, and should include best practices from different nations to build a resilient cyber defense.
Three U.S. senators are demanding answers from Experian after it suffered a breach that exposed personal information for 15 million T-Mobile subscribers. They also have called for national breach notification and data security regulations.
Trend Micro's Q2 Security roundup report indicates that existing attack vectors are getting starker, even as cybercrime is getting more commoditized. Myla Pilao shares key insight on the landscape in the region.
Security experts discuss ways to protect a nation's critical infrastructure, including power, defense and transportation, against growing cyber threats. What methods do they suggest to mitigate emerging risks?
Security on the endpoint took a long time to move away from mere patching, hardening and anti-virus technologies. To fight advanced threats, experts say visibility on endpoints is being transformed by the advent of endpoint detection and response tools.
Prosecutors recommended that twin brothers Muneeb and Sohaib Akhter serve a six-year and a two-year sentence, respectively, after pleading guilty to hacking-related charges. But one of the men received a much lighter sentence.
The Court of Justice of the European Union has ruled that the EU-U.S. Safe Harbor data sharing agreement is invalid because the United States has failed to safeguard Europeans' privacy rights. Legal experts say the judgment is a direct response to Edward Snowden's revelations.
As cyber threats rise, industry experts see an opportunity to involve government and private entities in building the capacity of security professionals through effective partnerships and cybersecurity clusters.
As a result of Experian's data breach, 15 million T-Mobile subscribers are at risk from phishing attacks and fraud. But it's not clear what more T-Mobile can do to protect breach victims, says security specialist Mark James.
Cyber-insurance holds promise for enterprises looking to suitably cover risk in an unpredictable, and rapidly evolving information security landscape. Dinesh Bareja shares his thoughts on setting the groundwork.
Discount brokerage firm Scottrade says hackers accessed its computer network and stole names and street addresses of millions of its clients. The firm says it learned of the intrusion from law enforcement officials.
Gartner research director Craig Lawson discusses three waves of threat intelligence services that can be leveraged by enterprises in building a threat detection model, while emphasizing what is driving the third wave.
Even if China fails to live up to its promise to stop pilfering corporate trade secrets, as America's spy chief predicts, the U.S. could still benefit diplomatically from the two nations' cybersecurity agreement.
In addition to having a dedicated individual or team responsible for privacy matters, organizations must ensure their information security and IT staffs are knowledgeable about data privacy issues, says Trevor Hughes, CEO of the International Association of Privacy Professionals.