Muthoot Fincorp CIO, Nilakantan Krishnan, adopted a combination of technologies like IoT, mobility and cloud to secure its branches and brought down pending issues from 40 percent to 26 percent.
PayPal lures the masses to locate chinks in its armor after a recent cross-site scripting bug exposed a critical vulnerability in its website.
Payment pro PayPal recently migrated from VMware to OpenStack. Sri Shivananda, the man who spearheaded the migration talks about the rationale behind the move, and shares his two cents' worth for CIOs contemplating a cloud switch.
Pre-digital businesses tend to be more vulnerable as they rely on older systems, out of support software and are spread across multiple physical locations
When developers and suppliers carefully list the tools used to build an application and what third-party components are included, IT can improve software patching and updates
Growing national dependency on internet of things requires swift action on security front, DHS official says
Clean out and restore your PC to its pristine state.
Not all router security issues can be fixed by users, but there are many actions that can be taken to protect them from attacks
Experts in ecommerce, security, marketing and customer service discuss the best ways to foster trust with your consumers – and build a loyal customer base.
Network designers and CIOs should look at each network security component individually and make a choice based on the capabilities of that component, says Mark Riley, CTO, ContentKeeper.
Red Hat’s think tank has always sworn by open-source, and believes that it’s the key to unleashing next-gen technologies. With IoT storming the enterprise, the pitch remains the same. Here’s why Red Hatters believe open-source is where you ought to put your money.
Simply put, deception technology uses decoys to misdirect the attacker and prevent him/her from going deeper into the network and reaching the intended target. A conversation with Rajpreet Kaur, senior research analyst, Gartner reveals how ‘honey-trapping’ hackers could give you a leg up.
InfoWorld talks with GitHub's Jamesha Fisher about the cultural shifts necessary for baking security early into the devops process
Network World chats with John Hurley, CEO of SmartFile, about how enterprise IT departments can embrace "rogue users" and "Shadow IT" instead of shutting them down.
"We are becoming the de facto standard when it comes to encryption," says Rahul Kumar, Country Manager, WinMagic India.
Facebook does not have permission from WhatsApp 35 million German users to transfer their data, said Hamburg's Data Protection Commissioner
Yahoo has blamed its massive data breach on a "state-sponsored actor"
DDoS attacks got a power boost thanks to hundreds of thousands of insecure IoT devices
A centralized approach that governs how apps interact and what they are allowed to do is essential
New EU regimes are under consideration, but currently uncertainty reigns
Given the success of ransomware, we need to look deeper for solutions beyond those mentioned most frequently. Here are are few of these solutions.
When tragedy takes the form of a hurricane or a mass shooting, fraudsters use the reach and anonymity of internet to exploit grief. Watch out for them.
The economic operating system of the world will be rewritten as the future holds no ordinary disruptions. Be prepared to face the new reality as we walk you through the technological innovations that will hit you soon.