Security

Feature

Security, Privacy Still Impede Cloud Adoption: Research

A study states that security is the single largest concern that organizations have to tackle when moving a workload to cloud.

CISOs Can Combat APTs with a Bit of Preparation

Advanced persistent threats are on the rise. It is time for CISOs to move beyond the traditional security measures. 

Technology Refines Education at Indian School of Business

Jitendra Nath, CIO, Indian School of Business, talks about how the institution is using technology to improve every student’s learning experience.

More

How-To

How to Achieve Better Third-party Security

No enterprise is an island. In a connected world, a business cannot function without multiple relationships with third parties--outside vendors, contractors, affiliates, partners, and others.

How to Protect Yourself Against Privileged User Abuse

The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE).

How to Test the Security Savvy of Your Staff

How do you know your employees retain what you teach them in company-required security awareness training? You don't -- unless you regularly test their security savvy and effectively address their mistakes during post-test follow-up sessions.

More

Interview

My Job is to Hallucinate: Unisys CTO

Jim Thompson, CTO, Unisys, talks to Computerworld India about the company’s Forward! solution, the state of the Unix mission critical market and how India figures in Unisys’s future plans.

Our Unique Pricing Model is a Deal Clincher: Niall King, Barracuda

Niall King, Regional VP, APAC, Barracuda Networks, talks about the competition, trends in its customer space, and why its USPs make it a vendor of choice among Indian organizations.

Magnasoft Northstar: The Cloud Was a Natural Fit for Us

The Head of Product Development Division, Magnasoft Northstar, Kunal Ashar talks about how the cloud has helped the company to grow and be more competitive in the market.

More

Video

Computerworld Tech Update 06 - 10 Jan, 2014

In this roundup of tech news from ComputerWorld for the week 06 - 10 January, 2014, we talk about the status of Microsoft's CEO search, NASSCOM appointing a new president, wearable tech making a strong showing at CES 2014, Intel dropping the McAfee name, and Tablets out-shipping PCs in the current year.

Computerworld Tech Update: 02 - 06 December, 2013

In this roundup of tech news from ComputerWorld for the week 02 - 06 December, 2013, we talk about Amazon Drone, Twitter fake followers, Indian Smartphone market, Botnet and Google's Compute Engine.

Computerworld Tech Update: 18 - 22 Nov, 2013

In this roundup of tech news for the week 18 - 22 November, 2013 we talk about Google, Yahoo, Microsoft, Salesforce.com and the Indian IT market.

More

News

Cisco, Oracle Find Dozens of Their Products Affected by Shellshock

Cisco has identified 71 products vulnerable to Shellshock and Oracle 51, but the number is likely to increase.

Google Triples Bug Bounty Reward Range to USD 15,000

Google has tripled its maximum reward for finding flaws in its software to US$15,000.

CloudFlare Aims to Simplify SSL Encryption with Free Service

Having encryption is critical to advancing a more secure future of the Internet, according to CloudFlare.

More

Opinion

Security Manager's Journal: Trapped: Building Access Controls Go Kablooey

Doors just stop working when one old PC in a storage closet dies.

IoT: Challenges of Securing IP-enabled Devices

A few years ago, the idea of home and office appliances being connected to a network, may have seemed strange. Today, however this is fast becoming a reality, as technology continues to develop and evolve, increasing in complexity and sophistication.

Facebook's Icky Psychology Experiment is Actually Business as Usual

Everybody has heard about Facebook's creepy, secret, psychological experiment designed to see if negative newsfeed posts inspire more negativity -- and vice versa. I too was weirded out by the revelations, feeling manipulated and that my privacy had been invaded upon.

More

Slide-Show

10 Mistakes Companies Make After a Data Breach

In a recent presentation for The International Association of Privacy Professionals (IAPP) Privacy Academy, Michael Bruemmer of Experian Data Breach Resolution outlined some the common mistakes his firm has seen as organizations deal with the aftermath of a breach.

State of the Internet

If you are a looking to understand the internet spectrum, from knowing which country contributes the most to the attack traffic, to, which country boasts having the highest internet speeds, Akamai’s “State of the Internet” report is a good place to start from.

9 Apps That Should be Blacklisted in Your BYOD Policy

Not all apps are fun. Some apps are virtual Trojan horses that swipe personal data when consumer's are not looking and become a serious security threat if you employees also bring personal devices to work. Appthority has put together a list of some of the worst offenders for you to blacklist off in your BYOD policy.

More