Attitudes about cyberthreat information sharing, as well as attack attribution, have dramatically changed in the last 18 months, says the FS-ISAC's Bill Nelson, a featured speaker at RSA Conference 2015.
With India facing a major staffing deficit in cybersecurity, the National Security Database is redoubling its efforts to organize a credible workforce. Director Rajshekhar Murthy shares these initiatives.
The Supreme Court has quashed Section 118 (d) of the Kerala Police Act for violating the fundamental right of freedom. Some cyberlaw experts call it a short-sighted decision that will deter the fight against cybercrime.
As information sharing becomes increasingly vital in building resilient cybersecurity, FS-ISAC's Denise Anderson discusses how the Indian financial sector should put a strong collaborative structure in place.
During her first month on the job, former Secretary of State Hillary Clinton used a private email server that lacked a digital certificate that would have ensured encrypted and authenticated email communications, surmises security firm Venafi.
"Align technology with businesses" is an old phrase. But information security is now part of this change, making strides to align with growth as a business enabler. Enter: the converged technology operations center.
As part of its biggest reorganization in its nearly seven-decade history, the Central Intelligence Agency is creating a Directorate of Digital Innovation that will use cyber technology to amass and analyze intelligence.
Sources say Dr. Gulshan Rai, CERT-In's chief, will soon be named special secretary at the PMO to drive cybersecurity strategy. Can this move help enable Modi's vision of a cyber-secured nation?
A new report details new clues suggesting that the massive data breach involving health insurer Anthem was launched by Chinese hackers. But will such evidence help businesses blunt future APT attacks?
Security leaders expect the new Union budget to give a needed boost to cybersecurity education, as well as increased investment in critical infrastructure, biometrics and surveillance to fight cybercrime.
ITSERT's Rajan Raj Pant discusses the formation of ITSERT-NP to address Nepal's security challenges. How will the public-private partnership model be leveraged to create a central platform for cybersecurity?
Cybercrime is on the rise. To combat it, GTU is launching e-Raksha Research Centre - a public private partnership initiative. The spin-off is also aimed at growing the capacity of InfoSec professionals.
The Hong Kong regional headquarters of (ISC)² is collaborating with universities across Asia through its Global Academic Program to deliver essential skills to help grow the information security workforce.
Lawmakers have begun the process of taking up President Obama's call to enact cyberthreat information sharing legislation. But can Congress reach a consensus on appropriate liability protection, the issue that derailed earlier legislative proposals?
A key component of President Obama's executive order to encourage industry to share cyberthreat data is the creation of information sharing and analysis organizations, or ISAOs. But now, the hard part begins: defining the job and getting it done.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.