Apart from using sophisticated security solutions to ensure protection from insider security breach, CIOs should block unauthorized access to sensitive applications says Sanjay Deshpande, CEO, Uniken.
The stark reality of women being victims of gender-based income disparity was brought to light in a recent research report by monsterindia.com
In this roundup of tech news from ComputerWorld for the week 02 - 06 December, 2013, we talk about Amazon Drone, Twitter fake followers, Indian Smartphone market, Botnet and Google's Compute Engine.
In this roundup of tech news for the week 28 - 31 October, 2013 we talk about Infosys, Dell, cyber crime and enterprise cloud.
Day two of the trial between Oracle and Google is underway in San Francisco.
SAP will pay Oracle about US$359 million in damages and interest to settle the case.
The former Oracle employee charges the company with restraining competition.
BMC claims that ServiceNow infringes patents in its core products.
Have a taste for tearing apart malware? Then you have probable played with Cuckoo Sandbox. If not, it is really time to take a poke at it.
Whether you're talking about your network, your company's building or your home, a perimeter approach to security is no longer adequate. As McAfee discussed at this week's RSA Conference, you can't provide physical or electronic security simply by trying to prevent authorized access -- you have to rethink all types to security to protect data and lives.
In medieval times, kings let barbarians break down the castle gates but made sure they paid the price once they got inside. McAfee's approach to security takes a similar approach -- since data breaches are inevitable, companies should worry less about the perimeter and more on catching the bad guys in the act.