India currently has 22,000 information security professionals, but needs 800,000 by 2020. Can the government's scheme bring in the necessary skills? What is the risk to business if these roles aren't filled?
The president's proposal would provide stronger privacy protections than legislation passed by the House in the last Congress, and furnish targeted liability protections to businesses that share cyberthreat information.
Nobody wants to be a cyber-attacker's first victim. But there are benefits to being second or third, says Akamai's Mike Smith. Then you get to enjoy the true benefits of the oft-discussed information sharing.
The Telangana state government has initiated discussions to launch a unique cybersecurity training programme for creating jobs in the state. What key elements must this programme include to be successful?
Amidst a global information security staffing crisis, India must focus on developing more practitioners with deep technical skills. This is the practical advice from Hord Tipton, out-going director of (ISC)Â².
Richard Spurr has been CEO of security vendor ZixCorp for more than 10 years. How has his approach to e-mail security evolved, and how does he see evolving threats and the marketplace changing in the year ahead?
The latest entrant into the password "hall of shame" is Sony Pictures Entertainment. As the ongoing dumps of Sony data by Guardians of Peace highlight, Sony apparently stored unencrypted passwords with inadequate access controls.
Amy McHugh, a former FDIC IT examination analyst, says banking regulators will soon scrutinize C-level executives and boards of directors to gauge their cybersecurity awareness in the wake of the FFIEC's pilot cyber-risk assessment program.
The National Institute of Standards and Technology has released a draft of guidance aimed at helping government agencies and businesses establish, participate in and maintain cyberthreat information sharing relationships.
In new guidance from the PCI Council, its leaders outline why businesses that handle card data need to address employee education. Here, experts explain why this guidance is a positive step for card security.
Sophisticated threats require advanced threat protection. A threat-focused next-generation firewall must adhere to three strategic imperatives. Learn how these imperatives improve defense against advanced threats.