Apart from using sophisticated security solutions to ensure protection from insider security breach, CIOs should block unauthorized access to sensitive applications says Sanjay Deshpande, CEO, Uniken.
The stark reality of women being victims of gender-based income disparity was brought to light in a recent research report by monsterindia.com
In this roundup of tech news from ComputerWorld for the week 02 - 06 December, 2013, we talk about Amazon Drone, Twitter fake followers, Indian Smartphone market, Botnet and Google's Compute Engine.
In this roundup of tech news for the week 28 - 31 October, 2013 we talk about Infosys, Dell, cyber crime and enterprise cloud.
Day two of the trial between Oracle and Google is underway in San Francisco.
Apple is the first smartphone maker to abide by a new California anti-theft law.
Qualcomm is facing an antitrust probe in China for allegedly overcharging clients.
Nvidia says seven of its GPU patents were infringed, opening a new front in the patent wars.
Have a taste for tearing apart malware? Then you have probable played with Cuckoo Sandbox. If not, it is really time to take a poke at it.
Whether you're talking about your network, your company's building or your home, a perimeter approach to security is no longer adequate. As McAfee discussed at this week's RSA Conference, you can't provide physical or electronic security simply by trying to prevent authorized access -- you have to rethink all types to security to protect data and lives.
In medieval times, kings let barbarians break down the castle gates but made sure they paid the price once they got inside. McAfee's approach to security takes a similar approach -- since data breaches are inevitable, companies should worry less about the perimeter and more on catching the bad guys in the act.