Apart from using sophisticated security solutions to ensure protection from insider security breach, CIOs should block unauthorized access to sensitive applications says Sanjay Deshpande, CEO, Uniken.
The stark reality of women being victims of gender-based income disparity was brought to light in a recent research report by monsterindia.com
In this roundup of tech news from ComputerWorld for the week 02 - 06 December, 2013, we talk about Amazon Drone, Twitter fake followers, Indian Smartphone market, Botnet and Google's Compute Engine.
In this roundup of tech news for the week 28 - 31 October, 2013 we talk about Infosys, Dell, cyber crime and enterprise cloud.
Day two of the trial between Oracle and Google is underway in San Francisco.
The ISP industry has proposed constructive strategies to combat online copyright infringement, but warned that elements of the Federal Government's current proposals would damage industry and consumers alike.
SAP is very pleased with the court's action, a spokesman says
Apple will appeal an order from this week that denied the ban.
Have a taste for tearing apart malware? Then you have probable played with Cuckoo Sandbox. If not, it is really time to take a poke at it.
Whether you're talking about your network, your company's building or your home, a perimeter approach to security is no longer adequate. As McAfee discussed at this week's RSA Conference, you can't provide physical or electronic security simply by trying to prevent authorized access -- you have to rethink all types to security to protect data and lives.
In medieval times, kings let barbarians break down the castle gates but made sure they paid the price once they got inside. McAfee's approach to security takes a similar approach -- since data breaches are inevitable, companies should worry less about the perimeter and more on catching the bad guys in the act.