A highly targeted form of phishing, spear phishing involves bespoke emails being sent to well-researched victims. It is hard to spot without close inspection and difficult to stop with technical controls alone.
The chief information security officer (CISO) is the executive responsible for an organization's information and data security. Learn what it takes to land a CISO job and how to be successful in the role.
From exposing Aadhaar vulnerabilities to hunting down bugs in Microsoft. Here are four white hat hackers who made waves in the cybersecurity realm this year.
The single biggest threat to widespread proliferation of connected cars is data security. A conversation with two giants in the Indian auto space – Tata Elxsi and Tata Technologies brings to light why the threat is of paramount importance and what can be done to bolster security.
Experian's annual data breach forecast predicts that biometric hacking will continue to surge as more mobile devices use fingerprint scans and Face ID technology to protect corporate and consumer data. But there are ways to avoid being hacked.
Amidst all the furore around Aadhaar being used for eKYC and UIDAI’s supposed ineptitude, PwC’s cybersecurity leader Sivarama Krishnan denounces the practice of media calling every vulnerability a breach. And he’s got a point.