What will be the top data breach and security trends in India and the rest of Asia in 2017? Experts offer their predictions, as well as insights on mitigating emerging risks.
For organizations considering using public cloud-based services, asking tough security questions of the vendor is an essential first step, says Eric Chiu, president of HyTrust.
Representatives of government and various business sectors discussed actionable steps to create a cyber-secure environment at Information Security Media Group's recent GovInfoSec Summit Asia 2016 in New Delhi.
Law enforcement officials in the U.S., Europe and Asia say they've dismantled a resilient network used by cybercriminals to infect tens of millions of computers with malicious software.
The Internet Archive, a pioneering 20-petabyte digital repository, is raising funds to replicate its data in Canada. The group's founder fears that the election of Donald Trump as the next U.S. president portends an uncertain privacy rights future.
ISMG's upcoming Breach Prevention Summit in New Delhi shares steps for creating a cybersecure environment, as experts will discuss new approaches to tackle breaches and issues related to national critical infrastructure.
Score one for preparation: In the wake of a ransomware attack that infected 900 workstations, the San Francisco Municipal Transportation Agency says it's restoring affected systems, vowing to not give the attackers a single bitcoin of their ransom demand.
As more organizations take advantage of cloud computing, it's essential that they set precise security expectations with their vendor partners, Carson Sweet of CloudPassage says in this video interview.
Cloud-based services can be both a "blessing and curse" when it comes to dealing with security, says John Houston, CISO and associate counsel for the University of Pittsburgh Medical Center, who explains why in this video interview.
President-elect Donald Trump will review the nation's cyber vulnerabilities at the start of his presidency, just like Barrack Obama did. But Trump hasn't demonstrated the deep understanding of cyber that Obama did when he took office nearly eight years ago.
For more than a decade, Christy Wyatt was immersed in mobile security - most recently as CEO of Good Technology. Now she has re-emerged as CEO of Dtex Systems. What new challenges does this role pose to the veteran security and technology leader?
In an interview, former U.S. government cybersecurity official Mark Weatherford discusses why the desire to obtain cybersecurity insurance could be a strong catalyst for Asian enterprises to take security more seriously.
Dropbox says its security has come a long way since 2012, when attackers stole 69 million login credentials. Its systems are now designed to resist and counter a breach to minimize impact on users.
Increasingly, malware designed for Apple Mac computers can access a user's webcam. But now a researcher has built a tool designed to detect if malware might be secretly recording a private call.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.