Security

Case Study

How Manappuram Finance Optimized Security with the Help of Technology

In the face of severe security threats regarding safeguarding gold ornaments, Manappuram Finance introduces Remote Video Surveillance and Automatic Intrusion Alert Management System to counter the risks at hand. 

More

Feature

Are Metaverse Pioneers Making the Same old Security Mistakes?

Ask security pros what they would change about the Internet if they could go back in time knowing what they know now, and most can point to a list of mistakes we could have avoided.

How 'Power fingerprint' could Improve Security for ICS/SCADA Systems

Most people have heard that one way law enforcement can figure out who might be growing marijuana in their basement is to monitor power consumption.

More

How-To

Better Open Source Hygiene Would have Spooked GHOST

Software security should be pre-emptive instead of reactive

How to Achieve Better Third-party Security

No enterprise is an island. In a connected world, a business cannot function without multiple relationships with third parties--outside vendors, contractors, affiliates, partners, and others.

How to Protect Yourself Against Privileged User Abuse

The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE).

More

Interview

Security-as-a-Service is a Real Business Enabler for CIOs : Pekka Usva, F-Secure

Decision-makers in enterprises often wrongly differentiate between the security requirements during the PC era as opposed to post-PC era. Consequently, mobile security does not feature high on their list of priorities, which I believe should happen ASAP, says Pekka Usva.

Adapt Multiple-layered, Multi-engine Defence Strategy: David Wigley, ContentKeeper

Content Security today requires a comprehensive multi-layered approach utilising multiple technologies, says David Wigley, CEO, ContentKeeper.

'Security made Simple' Vision Empowers CIOs: Sophos CEO Kris Hagerman

Combining great technology - that is well deployed, well maintained - with user base conscious of the threat landscape results in effective security posture, says Kris Hagerman, Chief Executive Officer, Sophos.

More

Video

Computerworld Tech Update 06 - 10 Jan, 2014

In this roundup of tech news from ComputerWorld for the week 06 - 10 January, 2014, we talk about the status of Microsoft's CEO search, NASSCOM appointing a new president, wearable tech making a strong showing at CES 2014, Intel dropping the McAfee name, and Tablets out-shipping PCs in the current year.

Computerworld Tech Update: 02 - 06 December, 2013

In this roundup of tech news from ComputerWorld for the week 02 - 06 December, 2013, we talk about Amazon Drone, Twitter fake followers, Indian Smartphone market, Botnet and Google's Compute Engine.

Computerworld Tech Update: 18 - 22 Nov, 2013

In this roundup of tech news for the week 18 - 22 November, 2013 we talk about Google, Yahoo, Microsoft, Salesforce.com and the Indian IT market.

More

News

NTIA to Push for Drone Privacy Standards

The U.S. National Telecommunications and Information Administration plans to host a series of meetings with interested people aimed at developing best practices for protecting privacy in the burgeoning aerial drone industry.

FREAK is Another Serious Flaw in the Web's Encryption

Experts are warning of a serious security flaw that has apparently gone undetected for years and can weaken encrypted connections between computers and websites, potentially undermining security across the Internet.

More

Opinion

Legal compliance challenges of Big Data: Seeing the forest for the trees

The size and complexity involved in big data projects bring forth myriad legal and compliance challenges.

Time to Reprioritize Security Awareness Efforts

The Sony, CENTCOM, and just about every other major attack are proving that poor awareness is costing organizations a lot of money.

Will 2015 Be the Year We Say Goodbye to Passwords?

While passwords are a cost effective security measure, they are not under the control of the organisations unlike many other security control. 2015 might see enterprises switching to two step authentication and non standard security methods like biometrics.

More

Slide-Show

10 Mistakes Companies Make After a Data Breach

In a recent presentation for The International Association of Privacy Professionals (IAPP) Privacy Academy, Michael Bruemmer of Experian Data Breach Resolution outlined some the common mistakes his firm has seen as organizations deal with the aftermath of a breach.

State of the Internet

If you are a looking to understand the internet spectrum, from knowing which country contributes the most to the attack traffic, to, which country boasts having the highest internet speeds, Akamai’s “State of the Internet” report is a good place to start from.

9 Apps That Should be Blacklisted in Your BYOD Policy

Not all apps are fun. Some apps are virtual Trojan horses that swipe personal data when consumer's are not looking and become a serious security threat if you employees also bring personal devices to work. Appthority has put together a list of some of the worst offenders for you to blacklist off in your BYOD policy.

More