RSA Conference Asia Pacific and Japan, which wrapped up last week, was a successful reflection of this region's hottest security topics. Here are some of my own observations, as well as feedback from the attendees.
Will the Office of Personnel Management's breaches, which exposed the personal information of more than 22 million individuals, make it more or less likely that Congress will enact cybersecurity legislation, including a cyberthreat information sharing bill?
Security expert Alan Woodward is warning that enterprises should ditch RC4 after researchers demonstrated practical attacks that demolish the crypto that's widely used in enterprise WiFi devices and for TLS.
Virtualization and related developments bring significant changes to the architecture of today's data centers. At RSA Conference Asia Pacific & Japan, Cisco's Munawar Hossain defines these changes and outlines the new challenges.
Organizations think they have done everything right, yet still they are breached. What has gone wrong? RSA's CTO Zulfikar Ramzan says it's time for security practitioners to shift to a new prevention mindset.
One of the most important lessons emerging from the recent string of major cyberattacks in the healthcare sector is the need for executives to treat information security as an essential component of business operations, says attorney Ron Raether.
A lawsuit filed against information services firm Experian alleges the company failed to detect that a customer of its data aggregator unit was a fraudster. Could stronger customer vetting have prevented misuse of information?
Those testifying at a July 23 Senate hearing, including David Kibbe, M.D., said the federal government, healthcare providers and electronic health records vendors could take steps to help ensure the secure exchange of patient information is not blocked.
Amit Yoran, president of RSA, says Asian organizations must re-think their approach to security. He outlines five key steps to building a resilient cyber defense mechanism. But how do security leaders respond?
Put your personal feelings aside; what's dangerous about the AshleyMadison.com breach is that ideologists will now go beyond taking down an IT system and actually destroy a business. This evolution, says cybersecurity expert Carl Herberger, requires a new way to assess and mitigate risk.
Cybercrime is growing as an industry, developing capabilities to target large entities. Ernst & Young's Ken Allan recommends a three-stage strategy to combat threats and urges CISOs to set new priorities.
RSA Conference Asia Pacific & Japan kicked off in Singapore with some power-packed keynote sessions by security leaders. Here are some of my first impressions about the tone set for the event and the days to follow.
The Ashley Madison dating website hack and threatened data release is a perfect illustration of the perils - and promise - of our Internet-connected, hacktivist age, whether it comes to online dating or the Internet of Things.
A lawsuit seeking class-action status was filed against UCLA Health on the first business day after the healthcare organization revealed it was the victim of a cyberattack that potentially compromised information on 4.5 million individuals.
Enterprises in APAC are prone to greater risks because of a lack of awareness about advanced threats, says BH Global CIO Ken Soh. He shares insights on how to prepare incident response teams to combat threats.