Security

Case Study

Camera Corners Traffic Offenders and Criminals with ANPR Technology

To provide better safety and security to its citizensMahindra Defence implements smart surveillance 2.0 in Lucknow.

 

How Manappuram Finance Optimized Security with the Help of Technology

In the face of severe security threats regarding safeguarding gold ornaments, Manappuram Finance introduces Remote Video Surveillance and Automatic Intrusion Alert Management System to counter the risks at hand. 

More

Feature

Tired of memorizing passwords? A Turing Award winner came up with this algorithmic trick

Passwords are a bane of life on the Internet, but one Turing Award winner has an algorithmic approach that he thinks can make them not only easier to manage but also more secure.

Telstra’s ‘five knows of cyber security’

Telstra lives by ‘five knows of cyber security’ when it comes to protecting information across the organisation, according to chief security officer, Mike Burgess.

The mission and capabilities of the FBI Cyber Division

Find out about the mission of the Cyber division, the resources available, how best to engage the FBI, among other topics.

More

How-To

Cloud Storage Alternatives: Three Ways to Sync your Own Data Securely and Privately

Robert D Lonsdale, Jr runs his business from two computers in different states. He needs to keep files synced between them, but he would "prefer not to use a cloud service."

How CISOs Can Create Security KPIs and KRIs

Recent research by the Information Security Forum has found that many CISOs are reporting the wrong key performance indicators (KPIs) and key risk indicators (KRIs).

How to Stop the Security Breach Tsunami

It seems like almost every week there is a new security breach in either the government or in private business. The latest had nothing to do with China, instead it appeared to be more of a revenge attack by one baseball team on another.

More

Interview

Dell’s ‘End-to-End’ Stack Syncs with Organizations’ SDDC Journey: Brenton Smith

Globally, nothing will halt IoT wave. There would be some pockets of absolute stupidity (experimentation) along the way, says Brenton Smith, VP & GM, Dell Software Group, APJ.  

Building secure APIs will remain a challenge around enterprise applications

Aamir Lakhani, senior security strategist at Fortinet’s FortiGuard Labs, talks about few instances of security breaches that occurred recently and why they are worth keeping in mind while planning a security strategy. Lakhani also highlights how lack of proper training is making organizations vulnerable to advanced security threats. 

Theft of devices having patient data remains a major security threat in healthcare

Nandkishor Dhomne, CIO, Manipal Health Enterprises, highlights the challenges surrounding security and how to enlighten business about its significance. 

More

Video

'There's something wrong if your organization doesn't have a CISO yet'

The former Gartner fellow and Chief Evangelist at Metric Stream, French Caldwell tells us about what's the worst that can happen to organizations with little or no GRC guidelines.

Digital India to be Key Enabler for IoT: Narendra Bhandari, Intel

Intel is driving IoT framework or reference architecture from sensors to the back end servers and analysis across the ecosystem of tech vendors, developers, systems integrators and CIOs. It’s not about bits and bytes from a digital perspective but one needs to know temperature, location and other aspects. But it will require interesting new skillsets at the organisation end across the entire spectrum to the likes of information scientists, data partitioners, networking experts to drive the true benefits of IoT, says Narendra Bhandari, Director, Software & Services Group, Intel Asia Pacific.

Computerworld Tech Update 06 - 10 Jan, 2014

In this roundup of tech news from ComputerWorld for the week 06 - 10 January, 2014, we talk about the status of Microsoft's CEO search, NASSCOM appointing a new president, wearable tech making a strong showing at CES 2014, Intel dropping the McAfee name, and Tablets out-shipping PCs in the current year.

More

News

ESET Report: Huge gap in cyber security knowledge leaves Asia vulnerable

Malaysia takes the lead as the most cyber-savvy nation while Indonesia is on the bottom rung in this regard. 3 in 5 consumers in Asia unable to answer basic cyber security questions.

Gigamon collaborates with RSA

Gigamon Inc., traffic visibility solutions company, has teamed with RSA, the security division of EMC.

Check Point’s SandBlast sandbox spells R.I.P for ROP attacks

Check Point software upgrade counters an technique attackers have used to evade traditional sandboxes

More

Opinion

Of Black Hat and security awareness

The annual security conference was a chance to go deep. But back in the office, how do you get 100% of the company’s employees to complete the security awareness training?

Adobe Flash: Kill it now

It’s time to put Flash out of our misery once and for all. And, thanks to Google, it may finally happen.

Facial recognition wouldn't have prevented the murders of two WDBJ reporters

Security vendor uses tragic murders as promotional tool for new product

More

Slide-Show

In numbers: Akamai State of the Internet Security Report 2015

India was also one of the top target countries for web application attacks in Q2 2015.

10 Mistakes Companies Make After a Data Breach

In a recent presentation for The International Association of Privacy Professionals (IAPP) Privacy Academy, Michael Bruemmer of Experian Data Breach Resolution outlined some the common mistakes his firm has seen as organizations deal with the aftermath of a breach.

State of the Internet

If you are a looking to understand the internet spectrum, from knowing which country contributes the most to the attack traffic, to, which country boasts having the highest internet speeds, Akamai’s “State of the Internet” report is a good place to start from.

More