To provide better safety and security to its citizens, Mahindra Defence implements smart surveillance 2.0 in Lucknow.
In the face of severe security threats regarding safeguarding gold ornaments, Manappuram Finance introduces Remote Video Surveillance and Automatic Intrusion Alert Management System to counter the risks at hand.
Reading the headlines relating to cyber-security you would not be blamed for thinking we are in a losing battle against relentless foes. The breaches at OPM, Ashley Madison, Target, Sony, and many others highlight criminals are consistently looking for ways to breach our defences. It is understandable then why many CISOs may look nervously at their networks wondering if they will be the next victim, or worse, are they already a victim without knowing it.
On the Dark Web, nobody knows who you are. The flip side of that, however, is that you also don't know who your business partners are.
Robert D Lonsdale, Jr runs his business from two computers in different states. He needs to keep files synced between them, but he would "prefer not to use a cloud service."
It seems like almost every week there is a new security breach in either the government or in private business. The latest had nothing to do with China, instead it appeared to be more of a revenge attack by one baseball team on another.
Nandkumar Saravade, CEO, Data Security Council of India (DSCI) says that DSCI and NASSCOM have realized the significance of cyber security quite early, and had included promotion of Indian cyber security companies as part of their trade delegations to the global market.
Contrast Security's Jeff Williams talks about disclosure, bounty programs, and vulnerability marketing with CSO, in the first of a series of topical discussions with industry leaders and experts.
SMBs Should Look at IoT from an Operational Efficiency Perspective: Srikanth Gopalakrishnan, SAP Labs
As IoT reaches the peak of its hype cycle, enterprises realize its significance, and how this technology can release them from few pain points, that they have going through for a long time. Srikanth Gopalakrishnan, Vice President Product Management, SAP Labs believes that Internet of Things will revolutionize operational processes.
The former Gartner fellow and Chief Evangelist at Metric Stream, French Caldwell tells us about what's the worst that can happen to organizations with little or no GRC guidelines.
Intel is driving IoT framework or reference architecture from sensors to the back end servers and analysis across the ecosystem of tech vendors, developers, systems integrators and CIOs. It’s not about bits and bytes from a digital perspective but one needs to know temperature, location and other aspects. But it will require interesting new skillsets at the organisation end across the entire spectrum to the likes of information scientists, data partitioners, networking experts to drive the true benefits of IoT, says Narendra Bhandari, Director, Software & Services Group, Intel Asia Pacific.
In this roundup of tech news from ComputerWorld for the week 06 - 10 January, 2014, we talk about the status of Microsoft's CEO search, NASSCOM appointing a new president, wearable tech making a strong showing at CES 2014, Intel dropping the McAfee name, and Tablets out-shipping PCs in the current year.
Some Apple mobile users have been encountering a pop-up message that is particularly difficult to close.
Attackers have started exploiting a flaw in the most widely used software for the DNS (Domain Name System), which translates domain names into IP addresses.
Next-generation endpoint protection vendor SentinelOne has received the same certification that many traditional antivirus platforms seek, meaning it can be considered suitable for meeting certain requirements of industry and governmental regulations.
Another former JPMorgan Chase & Co. (JPMC) employee was recently arrested by the FBI on charges of stealing customer data and trying to sell it to an undercover informant for tens of thousands of dollars.
You may snigger when you hear that a few months after the euphemistically named AdultFriendFinder was hacked, now Ashley Madison has had its turn. The site, which enthusiastically advertises its ability to connect people to have affairs, had its accounts compromised, according to security reporter Brian Krebs and confirmed by the company.
Backed by a database that can be hacked into and changed, the NJAC may not really fix the perceived wrongs in the Supreme Court collegium system.
In a recent presentation for The International Association of Privacy Professionals (IAPP) Privacy Academy, Michael Bruemmer of Experian Data Breach Resolution outlined some the common mistakes his firm has seen as organizations deal with the aftermath of a breach.
If you are a looking to understand the internet spectrum, from knowing which country contributes the most to the attack traffic, to, which country boasts having the highest internet speeds, Akamai’s “State of the Internet” report is a good place to start from.
Not all apps are fun. Some apps are virtual Trojan horses that swipe personal data when consumer's are not looking and become a serious security threat if you employees also bring personal devices to work. Appthority has put together a list of some of the worst offenders for you to blacklist off in your BYOD policy.