PayPal lures the masses to locate chinks in its armor after a recent cross-site scripting bug exposed a critical vulnerability in its website.
Payment pro PayPal recently migrated from VMware to OpenStack. Sri Shivananda, the man who spearheaded the migration talks about the rationale behind the move, and shares his two cents' worth for CIOs contemplating a cloud switch.
To provide better safety and security to its citizens, Mahindra Defence implements smart surveillance 2.0 in Lucknow.
Cybercrime is always a hot-button issue, and last year was no different. What lessons can we learn from some of the more insidious trends and events to better prepare ourselves for the year ahead?
Animated example of some ways data thieves get to your data without hacking
Businesses are increasingly relying on data, but they're overlooking another key aspect of data: privacy. In order to keep up with the growing regulations surrounding data privacy, it may be time to hire a Chief Privacy Officer.
A security workforce shortage and other factors compound the problem of misconfigured security tools. There are solutions.
Take some time this weekend to secure your PC without spending a dime.
Crime Prevention through Environmental Design, or CPTED, is a method used in security planning that focuses on design, placement and the way the building is used as a means to increase security in an aesthetically pleasing manner.
The two relevant criteria for IDM are critically of the application from sensitivity of information standpoint and secondly the mass number of users, says Samarendra Kumar, InterGlobe Enterprises.
APT, DLP, NGFW are hyped for organization’s not updated with changing threat landscape and IT security team working in isolation without alignment to business, says Rishi Rajpal, Concentrix Corporation.
Security works in line with the business for us. We run business driven IT and not IT driven business says Sujoy Brahmachari, Sr. General Manager – IS & CISO, Hero MotoCorp.
John McCormack, CEO of Raytheon Websense, in a recent visit to india, spoke about the tremendous possibilities for leveraging the recent acquisition of Websense by Raytheon, for the global and the Indian enterprise market.
The former Gartner fellow and Chief Evangelist at Metric Stream, French Caldwell tells us about what's the worst that can happen to organizations with little or no GRC guidelines.
Intel is driving IoT framework or reference architecture from sensors to the back end servers and analysis across the ecosystem of tech vendors, developers, systems integrators and CIOs.
The UK is now at the centre of a nasty nasty convergence of skilled criminality
Dell is deploying a verification tool to ensure the boot layer in PCs and tablets hasn't been hacked
PatternEx says its Active Contextual Modeling is a form of artificial intelligence.
A new report shows a direct link between security problems in small businesses and enterprise security headaches. This happens when SMBs are suppliers or resellers for enterprises and are therefore connected.
As more enterprises adopt digital technologies, more of their data becomes vulnerable to security breaches and attacks. Is the answer to protect against breaches and attacks limited to only bolstering the security infrastructure? Perhaps not.
What does the future hold? We'll tell you!
This report, by NASSCOM, analyses the current scenario and emerging trends across the various dimensions that define the Indian start-up ecosystem, and also gauges India's position as a global start-up hub that is becoming attractive for investors, start-ups, and corporates.
India was also one of the top target countries for web application attacks in Q2 2015.