Security

Feature

A Security Awareness Success Story

The problem with Security Awareness programs is that it is hard to prove their successes. With technical countermeasures however, logs are maintained that allow to point to all of the prevented attacks.

Google I/O: Android L Pitched at Enterprise Users

Google will provide enterprise-focused security and management features to its entire Android showcase of mobile devices.

Where Culture and Security Clash

Physical perimeter security can differ from facility to facility, with myriad factors playing into what exactly is implemented, including budget and the protected assets.

More

How-To

How to Achieve Better Third-party Security

No enterprise is an island. In a connected world, a business cannot function without multiple relationships with third parties--outside vendors, contractors, affiliates, partners, and others.

How to Protect Yourself Against Privileged User Abuse

The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE).

How to Test the Security Savvy of Your Staff

How do you know your employees retain what you teach them in company-required security awareness training? You don't -- unless you regularly test their security savvy and effectively address their mistakes during post-test follow-up sessions.

More

Interview

My Job is to Hallucinate: Unisys CTO

Jim Thompson, CTO, Unisys, talks to Computerworld India about the company’s Forward! solution, the state of the Unix mission critical market and how India figures in Unisys’s future plans.

Our Unique Pricing Model is a Deal Clincher: Niall King, Barracuda

Niall King, Regional VP, APAC, Barracuda Networks, talks about the competition, trends in its customer space, and why its USPs make it a vendor of choice among Indian organizations.

Magnasoft Northstar: The Cloud Was a Natural Fit for Us

The Head of Product Development Division, Magnasoft Northstar, Kunal Ashar talks about how the cloud has helped the company to grow and be more competitive in the market.

More

Video

Computerworld Tech Update 06 - 10 Jan, 2014

In this roundup of tech news from ComputerWorld for the week 06 - 10 January, 2014, we talk about the status of Microsoft's CEO search, NASSCOM appointing a new president, wearable tech making a strong showing at CES 2014, Intel dropping the McAfee name, and Tablets out-shipping PCs in the current year.

Computerworld Tech Update: 02 - 06 December, 2013

In this roundup of tech news from ComputerWorld for the week 02 - 06 December, 2013, we talk about Amazon Drone, Twitter fake followers, Indian Smartphone market, Botnet and Google's Compute Engine.

Computerworld Tech Update: 18 - 22 Nov, 2013

In this roundup of tech news for the week 18 - 22 November, 2013 we talk about Google, Yahoo, Microsoft, Salesforce.com and the Indian IT market.

More

News

Criminals Ride Google Coattails in DDoS Attacks

The easy access Google's web crawlers have to sites is increasingly being exploited by cybercriminals in launching distributed denial of service attacks, a security vendor says.

Security Must Evolve to be 'All About the Data'

There is a fierce debate about whether GMOs--genetically modified organisms--with built-in resistance to pests, fungus, drought and other agricultural threats, are a good thing when it comes to our food supply.

More

Opinion

Security Manager's Journal: Trapped: Building Access Controls Go Kablooey

Doors just stop working when one old PC in a storage closet dies.

IoT: Challenges of Securing IP-enabled Devices

A few years ago, the idea of home and office appliances being connected to a network, may have seemed strange. Today, however this is fast becoming a reality, as technology continues to develop and evolve, increasing in complexity and sophistication.

Facebook's Icky Psychology Experiment is Actually Business as Usual

Everybody has heard about Facebook's creepy, secret, psychological experiment designed to see if negative newsfeed posts inspire more negativity -- and vice versa. I too was weirded out by the revelations, feeling manipulated and that my privacy had been invaded upon.

More

Slide-Show

10 Mistakes Companies Make After a Data Breach

In a recent presentation for The International Association of Privacy Professionals (IAPP) Privacy Academy, Michael Bruemmer of Experian Data Breach Resolution outlined some the common mistakes his firm has seen as organizations deal with the aftermath of a breach.

State of the Internet

If you are a looking to understand the internet spectrum, from knowing which country contributes the most to the attack traffic, to, which country boasts having the highest internet speeds, Akamai’s “State of the Internet” report is a good place to start from.

9 Apps That Should be Blacklisted in Your BYOD Policy

Not all apps are fun. Some apps are virtual Trojan horses that swipe personal data when consumer's are not looking and become a serious security threat if you employees also bring personal devices to work. Appthority has put together a list of some of the worst offenders for you to blacklist off in your BYOD policy.

More