Apart from using sophisticated security solutions to ensure protection from insider security breach, CIOs should block unauthorized access to sensitive applications says Sanjay Deshpande, CEO, Uniken.
In this roundup of tech news from ComputerWorld for the week 02 - 06 December, 2013, we talk about Amazon Drone, Twitter fake followers, Indian Smartphone market, Botnet and Google's Compute Engine.
In this roundup of tech news for the week 28 - 31 October, 2013 we talk about Infosys, Dell, cyber crime and enterprise cloud.
Day two of the trial between Oracle and Google is underway in San Francisco.
A federal judge has put the brakes on an investigation of Google in Mississippi, where the movie industry was accused of conspiring with the state's attorney general to revive the failed Stop Online Piracy Act (SOPA).
The Supreme Court reserved its verdict on a slew of petitions challenging the validity of Section 66A of the IT Act.
A U.S. federal judge has dismissed an antitrust lawsuit that charges Google harmed consumers by forcing Android handset makers to use its apps by default, but gave the plaintiffs three weeks to amend their complaint.
Have a taste for tearing apart malware? Then you have probable played with Cuckoo Sandbox. If not, it is really time to take a poke at it.
Whether you're talking about your network, your company's building or your home, a perimeter approach to security is no longer adequate. As McAfee discussed at this week's RSA Conference, you can't provide physical or electronic security simply by trying to prevent authorized access -- you have to rethink all types to security to protect data and lives.
In medieval times, kings let barbarians break down the castle gates but made sure they paid the price once they got inside. McAfee's approach to security takes a similar approach -- since data breaches are inevitable, companies should worry less about the perimeter and more on catching the bad guys in the act.