Feature

What is biometrics? And why collecting biometric data is risky

Biometric authentication uses physical or behavioral human characteristics to digitally identify a person to grant access to systems, devices or data. It has the potential to make authentication dramatically faster, easier and more secure than traditional passwords, but companies need to be careful about the biometric data they collect.

CISOs in Southeast Asia: Salary expectations and job description

What are the responsibilities and salary of Chief Information Security Officers?

What is digital forensics? And how to land a job in this hot field

Digital forensics is the application of scientific investigatory techniques to digital crimes and attacks. Think beyond the awful (and justly cancelled) TV show CSI Cyber; digital forensics is a crucial aspect of law and business in the internet age and can be a rewarding and lucrative career path.

McAfee Total Protection vs. Norton Security Premium

McAfee and Norton are two of the best-known names in PC security. How do their latest top-level suites match up?

Spear phishing: Why targeted email attacks are so difficult to stop

A highly targeted form of phishing, spear phishing involves bespoke emails being sent to well-researched victims. It is hard to spot without close inspection and difficult to stop with technical controls alone.

What is a CISO? Responsibilities and requirements for this vital leadership role

The chief information security officer (CISO) is the executive responsible for an organization's information and data security. Learn what it takes to land a CISO job and how to be successful in the role.

Four white hat hackers who shot to fame in 2018

From exposing Aadhaar vulnerabilities to hunting down bugs in Microsoft. Here are four white hat hackers who made waves in the cybersecurity realm this year.

Authentication, encryption and AI – the key components in securing connected cars

The single biggest threat to widespread proliferation of connected cars is data security. A conversation with two giants in the Indian auto space – Tata Elxsi and Tata Technologies brings to light why the threat is of paramount importance and what can be done to bolster security.

Four regulatory changes that rocked enterprise tech in 2018

Here are four major regulatory changes of the year that made regulatory technology (RegTech) rise in prominence in 2018. 

Biggest cybersecurity breaches in 2018 that rocked the Indian threat landscape

Here is a list of the top cybersecurity breaches that affected India in 2018.

Experian exec says biometrics won’t save you from mobile hacks

Experian's annual data breach forecast predicts that biometric hacking will continue to surge as more mobile devices use fingerprint scans and Face ID technology to protect corporate and consumer data. But there are ways to avoid being hacked.

How to hire the best cybersecurity talent

Cybersecurity has one of the biggest skills deficits across all IT verticals meaning finding the right talent isn’t always easy. Here’s how to get it right.