Compliance

What is "reasonable security"? And how to meet the requirement

Privacy regulations such as the GDPR and CCPA require companies to provide "reasonable security" to protect customers' personal information. Here's how you might best achieve that standard.

Group behind TRITON industrial sabotage malware made more victims

The attackers stayed undetected on the victim's network for more than a year and sought out operational technology networks.

Former CISO of Marvel Data Sciences Deepak Kalambkar joins SafexPay

With over 20 years of experience, industry veteran Deepak Kalambkar has moved from Marvel Data Services to SafexPay. 

Ola CISO Mohd Shadab Siddiqui quits

Mohd Shadab Siddiqui was the head of information security, fraud, risk and compliance at Ola (ANI Technologies).

Former TransUnion CIBIL security leader Shiju Rawther joins India Infoline

The former head of IT infra and security operations at TransUnion CIBIL, Shiju Rawther has now joined financial services major, India Infoline as Executive VP-IT.

New CISA director outlines top 5 priorities for protecting U.S. critical infrastructure

CISA’s Christopher Krebs has a two-year plan for his new cybersecurity agency, with China, supply chain and 5G as top priorities.

Malicious URLs now rampant: Study

Malicious URLs are now rampant problem according to a study which found they are contained in an average of one in every 61 emails.

IT auditor explained: Role, responsibilities, skills and salaries

An IT auditor is responsible for analyzing and assessing an organization’s technological infrastructure to find problems with efficiency, risk management and compliance.

Palo Alto Networks launches cybersecurity guide for organizations in India

‘Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers’ provides expert advice, insights and best practices. 

Money laundering scandals at APAC banks is due to lack of resources: Survey

25 percent cited a lack of expertise while 13 percent indicated it was political constraints imposed by government. 

The cybersecurity legislation agenda: 5 areas to watch

The 116th Congress is only a few months old, but far-reaching cybersecurity bills to protect infrastructure and the supply chain, ensure election integrity, and build a security workforce are now being considered. Here’s the list.

Cyber criminals cash in on millions with formjacking: Report

Faced with diminishing returns from ransomware and cryptojacking, cyber criminals are doubling down on alternative methods, such as formjacking, to make money.