Security

Case Study

How Manappuram Finance Optimized Security with the Help of Technology

In the face of severe security threats regarding safeguarding gold ornaments, Manappuram Finance introduces Remote Video Surveillance and Automatic Intrusion Alert Management System to counter the risks at hand. 

More

Feature

UBA vs. the Rogue Insider

The recent arrest by the FBI of a former employee of JP Morgan Chase for allegedly trying to sell bank account data, including PINs, ended well for the bank.

Free, Cheap and Easy Security Tools

When it comes to detecting, preventing and analyzing information security threats, security teams need all the help they can get.

More

How-To

Five Precautions for Avoiding Malware when you Download and Install Software

Roger Mccullough downloaded three separate programs, and Panda Anti-virus Pro found malware in all of them.

Digging Deeper into the Cisco ASA Firewall REST API

Security orchestration methods and of course SDN is driving the need for programmable interfaces in security products. The Cisco ASA Firewall added a REST API back in December with the 9.3(2) code release. I've asked Mason Harris, from Cisco, to write up a quick how-to primer on the ASA API capabilities. Thank you Mason for the great information. Author: Mason Harris CCIE #5916 Solutions Architect, Global Enterprise

More

Interview

Security-as-a-Service is a Real Business Enabler for CIOs : Pekka Usva, F-Secure

Decision-makers in enterprises often wrongly differentiate between the security requirements during the PC era as opposed to post-PC era. Consequently, mobile security does not feature high on their list of priorities, which I believe should happen ASAP, says Pekka Usva.

Adapt Multiple-layered, Multi-engine Defence Strategy: David Wigley, ContentKeeper

Content Security today requires a comprehensive multi-layered approach utilising multiple technologies, says David Wigley, CEO, ContentKeeper.

'Security made Simple' Vision Empowers CIOs: Sophos CEO Kris Hagerman

Combining great technology - that is well deployed, well maintained - with user base conscious of the threat landscape results in effective security posture, says Kris Hagerman, Chief Executive Officer, Sophos.

More

Video

Digital India to be Key Enabler for IoT: Narendra Bhandari, Intel

Intel is driving IoT framework or reference architecture from sensors to the back end servers and analysis across the ecosystem of tech vendors, developers, systems integrators and CIOs. It’s not about bits and bytes from a digital perspective but one needs to know temperature, location and other aspects. But it will require interesting new skillsets at the organisation end across the entire spectrum to the likes of information scientists, data partitioners, networking experts to drive the true benefits of IoT, says Narendra Bhandari, Director, Software & Services Group, Intel Asia Pacific.

Computerworld Tech Update 06 - 10 Jan, 2014

In this roundup of tech news from ComputerWorld for the week 06 - 10 January, 2014, we talk about the status of Microsoft's CEO search, NASSCOM appointing a new president, wearable tech making a strong showing at CES 2014, Intel dropping the McAfee name, and Tablets out-shipping PCs in the current year.

Computerworld Tech Update: 02 - 06 December, 2013

In this roundup of tech news from ComputerWorld for the week 02 - 06 December, 2013, we talk about Amazon Drone, Twitter fake followers, Indian Smartphone market, Botnet and Google's Compute Engine.

More

News

Nasscom Launches Task Force to turn India into the Hub of Cyber Security Research

India based global trade company Nasscom launched a task force which aims to turn India into the hub for cyber security related research, training and products.

As smartwatches gain traction, personal data privacy worries mount

Growing interest in smartwatches has sparked user privacy concerns as companies find ways to collect and use personal health, location and purchasing data found on the wearable devices of their customers and workers.

Minecraft used as Cover to push Android Scareware Apps on Google Play

Up to three million users might have downloaded bogus apps, says ESET

More

Opinion

Awareness Lessons from the Sony Hack

As more information is disclosed from the Sony hack, it demonstrates that awareness concerns go well beyond phishing.

More

Slide-Show

10 Mistakes Companies Make After a Data Breach

In a recent presentation for The International Association of Privacy Professionals (IAPP) Privacy Academy, Michael Bruemmer of Experian Data Breach Resolution outlined some the common mistakes his firm has seen as organizations deal with the aftermath of a breach.

State of the Internet

If you are a looking to understand the internet spectrum, from knowing which country contributes the most to the attack traffic, to, which country boasts having the highest internet speeds, Akamai’s “State of the Internet” report is a good place to start from.

9 Apps That Should be Blacklisted in Your BYOD Policy

Not all apps are fun. Some apps are virtual Trojan horses that swipe personal data when consumer's are not looking and become a serious security threat if you employees also bring personal devices to work. Appthority has put together a list of some of the worst offenders for you to blacklist off in your BYOD policy.

More