Muthoot Fincorp CIO, Nilakantan Krishnan, adopted a combination of technologies like IoT, mobility and cloud to secure its branches and brought down pending issues from 40 percent to 26 percent.
PayPal lures the masses to locate chinks in its armor after a recent cross-site scripting bug exposed a critical vulnerability in its website.
Payment pro PayPal recently migrated from VMware to OpenStack. Sri Shivananda, the man who spearheaded the migration talks about the rationale behind the move, and shares his two cents' worth for CIOs contemplating a cloud switch.
A new benchmark survey finds that more than half of organizations have a failing grade when it comes to securing privileged accounts that can give attackers access to their entire networks.
Twitter accounts are a good place to try spear phishing because of the combination of language used, APIs to rich data and use of shortened links
The face of outdoor advertising is set to change as billboards are getting a makeover with the Internet of Things.
Clean out and restore your PC to its pristine state.
Not all router security issues can be fixed by users, but there are many actions that can be taken to protect them from attacks
Experts in ecommerce, security, marketing and customer service discuss the best ways to foster trust with your consumers – and build a loyal customer base.
Network designers and CIOs should look at each network security component individually and make a choice based on the capabilities of that component, says Mark Riley, CTO, ContentKeeper.
Red Hat’s think tank has always sworn by open-source, and believes that it’s the key to unleashing next-gen technologies. With IoT storming the enterprise, the pitch remains the same. Here’s why Red Hatters believe open-source is where you ought to put your money.
Simply put, deception technology uses decoys to misdirect the attacker and prevent him/her from going deeper into the network and reaching the intended target. A conversation with Rajpreet Kaur, senior research analyst, Gartner reveals how ‘honey-trapping’ hackers could give you a leg up.
Network World chats with John Hurley, CEO of SmartFile, about how enterprise IT departments can embrace "rogue users" and "Shadow IT" instead of shutting them down.
"We are becoming the de facto standard when it comes to encryption," says Rahul Kumar, Country Manager, WinMagic India.
In a hyper-connected world, CISOs need multiple layers of defense and not just a ‘secure the breach’ approach, says Rana Gupta, vice president of APAC sales for identity and data protection at Gemalto.
President Obama has clarified how the government will respond to major attacks
It could be the latest major hotel chain to lose customer data to cybercriminals
Verizon's recent acquisitions help it track consumers online and on their mobile devices
A centralized approach that governs how apps interact and what they are allowed to do is essential
New EU regimes are under consideration, but currently uncertainty reigns
Given the success of ransomware, we need to look deeper for solutions beyond those mentioned most frequently. Here are are few of these solutions.
When tragedy takes the form of a hurricane or a mass shooting, fraudsters use the reach and anonymity of internet to exploit grief. Watch out for them.
The economic operating system of the world will be rewritten as the future holds no ordinary disruptions. Be prepared to face the new reality as we walk you through the technological innovations that will hit you soon.