Muthoot Fincorp CIO, Nilakantan Krishnan, adopted a combination of technologies like IoT, mobility and cloud to secure its branches and brought down pending issues from 40 percent to 26 percent.
PayPal lures the masses to locate chinks in its armor after a recent cross-site scripting bug exposed a critical vulnerability in its website.
Payment pro PayPal recently migrated from VMware to OpenStack. Sri Shivananda, the man who spearheaded the migration talks about the rationale behind the move, and shares his two cents' worth for CIOs contemplating a cloud switch.
Runtime-based technologies use contextual awareness to boost Java application security
Unknown players – probably a nation state – are probing the defenses of the core infrastructure of the internet. How worried should we be?
Pre-digital businesses tend to be more vulnerable as they rely on older systems, out of support software and are spread across multiple physical locations
Clean out and restore your PC to its pristine state.
Not all router security issues can be fixed by users, but there are many actions that can be taken to protect them from attacks
Experts in ecommerce, security, marketing and customer service discuss the best ways to foster trust with your consumers – and build a loyal customer base.
Network designers and CIOs should look at each network security component individually and make a choice based on the capabilities of that component, says Mark Riley, CTO, ContentKeeper.
Red Hat’s think tank has always sworn by open-source, and believes that it’s the key to unleashing next-gen technologies. With IoT storming the enterprise, the pitch remains the same. Here’s why Red Hatters believe open-source is where you ought to put your money.
Simply put, deception technology uses decoys to misdirect the attacker and prevent him/her from going deeper into the network and reaching the intended target. A conversation with Rajpreet Kaur, senior research analyst, Gartner reveals how ‘honey-trapping’ hackers could give you a leg up.
InfoWorld talks with GitHub's Jamesha Fisher about the cultural shifts necessary for baking security early into the devops process
Network World chats with John Hurley, CEO of SmartFile, about how enterprise IT departments can embrace "rogue users" and "Shadow IT" instead of shutting them down.
"We are becoming the de facto standard when it comes to encryption," says Rahul Kumar, Country Manager, WinMagic India.
The tool acts as a system driver and blocks ransomware and other malicious programs from injecting rogue code into the master boot record
The US is considering a "proportional' response to the alleged Russian hacking
The program tries to terminate common database-related processes like those of the MySQL, Oracle and Microsoft SQL servers
An effective strategy to handle shadow IT needs to confront two realities – the lack of visibility on an organization’s use of SaaS applications and the BYOD conundrum.
You’d think that when it made patches pretty much inescapable, Microsoft would have made darn sure they were problem-free. But you’d be wrong.
A centralized approach that governs how apps interact and what they are allowed to do is essential
When tragedy takes the form of a hurricane or a mass shooting, fraudsters use the reach and anonymity of internet to exploit grief. Watch out for them.
The economic operating system of the world will be rewritten as the future holds no ordinary disruptions. Be prepared to face the new reality as we walk you through the technological innovations that will hit you soon.