Security

Feature

App Development Promises Massive Growth: Raju Vegesna, Zoho

Internet penetration and Indian startups will act as a catalyst in the area of building industry-specific apps says Raju Vegesna of Zoho. Security remains the major concern.

Security, Privacy Still Impede Cloud Adoption: Research

A study states that security is the single largest concern that organizations have to tackle when moving a workload to cloud.

CISOs Can Combat APTs with a Bit of Preparation

Advanced persistent threats are on the rise. It is time for CISOs to move beyond the traditional security measures. 

More

How-To

How to Achieve Better Third-party Security

No enterprise is an island. In a connected world, a business cannot function without multiple relationships with third parties--outside vendors, contractors, affiliates, partners, and others.

How to Protect Yourself Against Privileged User Abuse

The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE).

How to Test the Security Savvy of Your Staff

How do you know your employees retain what you teach them in company-required security awareness training? You don't -- unless you regularly test their security savvy and effectively address their mistakes during post-test follow-up sessions.

More

Interview

My Job is to Hallucinate: Unisys CTO

Jim Thompson, CTO, Unisys, talks to Computerworld India about the company’s Forward! solution, the state of the Unix mission critical market and how India figures in Unisys’s future plans.

Our Unique Pricing Model is a Deal Clincher: Niall King, Barracuda

Niall King, Regional VP, APAC, Barracuda Networks, talks about the competition, trends in its customer space, and why its USPs make it a vendor of choice among Indian organizations.

Magnasoft Northstar: The Cloud Was a Natural Fit for Us

The Head of Product Development Division, Magnasoft Northstar, Kunal Ashar talks about how the cloud has helped the company to grow and be more competitive in the market.

More

Video

Computerworld Tech Update 06 - 10 Jan, 2014

In this roundup of tech news from ComputerWorld for the week 06 - 10 January, 2014, we talk about the status of Microsoft's CEO search, NASSCOM appointing a new president, wearable tech making a strong showing at CES 2014, Intel dropping the McAfee name, and Tablets out-shipping PCs in the current year.

Computerworld Tech Update: 02 - 06 December, 2013

In this roundup of tech news from ComputerWorld for the week 02 - 06 December, 2013, we talk about Amazon Drone, Twitter fake followers, Indian Smartphone market, Botnet and Google's Compute Engine.

Computerworld Tech Update: 18 - 22 Nov, 2013

In this roundup of tech news for the week 18 - 22 November, 2013 we talk about Google, Yahoo, Microsoft, Salesforce.com and the Indian IT market.

More

News

Symantec Sees Rise in High-traffic DDoS Attacks

The most common targets are gaming, software and media companies.

Google Extends Two-factor Authentication with Physical USB Keys

Google Chrome gets support for new authentication protocol called Universal 2nd Factor.

Microsoft Discloses Zero-day Flaw, Publishes Quick Fix

Attacks are under way using PowerPoint file, the company said.

More

Opinion

Security Manager's Journal: Trapped: Building Access Controls Go Kablooey

Doors just stop working when one old PC in a storage closet dies.

IoT: Challenges of Securing IP-enabled Devices

A few years ago, the idea of home and office appliances being connected to a network, may have seemed strange. Today, however this is fast becoming a reality, as technology continues to develop and evolve, increasing in complexity and sophistication.

Facebook's Icky Psychology Experiment is Actually Business as Usual

Everybody has heard about Facebook's creepy, secret, psychological experiment designed to see if negative newsfeed posts inspire more negativity -- and vice versa. I too was weirded out by the revelations, feeling manipulated and that my privacy had been invaded upon.

More

Slide-Show

10 Mistakes Companies Make After a Data Breach

In a recent presentation for The International Association of Privacy Professionals (IAPP) Privacy Academy, Michael Bruemmer of Experian Data Breach Resolution outlined some the common mistakes his firm has seen as organizations deal with the aftermath of a breach.

State of the Internet

If you are a looking to understand the internet spectrum, from knowing which country contributes the most to the attack traffic, to, which country boasts having the highest internet speeds, Akamai’s “State of the Internet” report is a good place to start from.

9 Apps That Should be Blacklisted in Your BYOD Policy

Not all apps are fun. Some apps are virtual Trojan horses that swipe personal data when consumer's are not looking and become a serious security threat if you employees also bring personal devices to work. Appthority has put together a list of some of the worst offenders for you to blacklist off in your BYOD policy.

More