The Government of India has established National Cyber Co-ordination Centre to handle increasing threats. Can NCCC effectively coordinate with private-sector bodies to drive cybersecurity initiatives?
Researchers at Kaspersky Lab have released information on a denial-of-service bug, dubbed "Darwin Nuke," found in Apple's operating systems. Security experts weigh in with recommendations.
New NIST guidance is aimed at helping organizations to better understand the risks associated with the information and communications technology supply chain, says Jon Boyens, a NIST senior adviser.
Islamic State sympathizers are exploiting a vulnerability in a WorldPress Content Management System plug-in to deface the websites of news outlets, businesses, religious groups and governments in the U.S. and abroad, the FBI says.
While Indian companies increasingly are getting PCI-DSS certified, a vast majority fail their interim assessment. Where are the security lapses? Ashish Thapar offers insights from Verizon's new report.
The upcoming RSA Conference 2015 in San Francisco will feature sessions ripped from the headlines, reflecting the challenges security professionals face in safeguarding their organizations' systems and information.
SEBI has directed capital markets to develop and deploy a robust cybersecurity framework to combat cyber-attacks. Security leaders welcome the move and recommend effective controls to support the initiative.
AT&T, in a settlement with the FCC, agrees to pay a $25 million fine because call center employees in Mexico, Colombia and the Philippines accessed private information from some 278,000 customer accounts without authorization.
Singapore-based Singtel, Southeast Asia's largest telecommunications company, has entered a definitive agreement to acquire U.S.-based managed security services company Trustwave for $810 million.
The DNS infrastructure underlying the Internet is the map that both the good guys and bad guys need. Dr. Paul Vixie, a member of the Internet Hall of Fame, discusses DNS' impact on the security landscape.
A breach of the White House IT system last October, believed to be by Russian hackers, exposed sensitive details about White House operations, such as the president's schedule, CNN reports.
India's e-commerce boom is throwing up huge security challenges. It's not enough to deploy security controls; a well-defined security architecture is essential, says Amit Singh, country manager, Dell SonicWall.
We all know that breaches and cybersecurity are topics of boardroom discussion. But how should security leaders present them to their boards? Jim Anderson of BAE Systems Applied Intelligence offers tips.
The RSA Conference is nearly a quarter-century old. What is the legacy of this event, and how is it flourishing in new geographic regions? Art Coviello, former chairman of RSA, reflects on the event's impact.
RSA Conference 2015 is expected to be the biggest gathering in the event's history. What's new at this year's event, and how can attendees get the most out of it? Program chair Hugh Thompson shares tips.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.