PayPal lures the masses to locate chinks in its armor after a recent cross-site scripting bug exposed a critical vulnerability in its website.
Payment pro PayPal recently migrated from VMware to OpenStack. Sri Shivananda, the man who spearheaded the migration talks about the rationale behind the move, and shares his two cents' worth for CIOs contemplating a cloud switch.
To provide better safety and security to its citizens, Mahindra Defence implements smart surveillance 2.0 in Lucknow.
Sitting in the corner, sometimes collecting dust, is an overlooked attack surface
From protecting merger discussions to everyday document management, enterprise DRM is a mature, mainstream enterprise technology. So why aren’t more companies using it?
Verizon’s 2016 Data Breach Investigations report is aimed at understanding how cyber security breaches occur, types of cyber-attacks faced by different industries and techniques to adopt in order to reduce the risk.
A system that mimics a human can be thought of as a system that generates an army of virtual analysts, but armies need leaders to direct and train them
A set of practices designed to bring security teams up to speed and leverage new ways to protect clouds
Tweak these settings to increase your protection with minimal annoyance.
We have extended our technology expertise to emerge as the preferred security vendor for enterprises, says Parvinder Walia, APAC sales director, ESET.
According to Riverbed Global Application Performance Survey 2015, 98 percent of executives agreed that optimal enterprise application performance is essential for achieving optimal business performance, and can drive increased productivity, cost savings, and improved customer satisfaction. Nagendra Venkaswamy, Vice President, Riverbed India and SAARC shares his views and insights on the same.
Ganesh Kuppuswamy Director of Arcserve India & SAARC region, offers his views and insights on what actions SMBs would be wise to take before the next disaster strikes.
CIOs should embrace hybrid infrastructure, analytics, security and mobility to innovate and stay ahead of the competition, says Neelam Dhawan, MD, HPE India.
Diana Kelley, executive security advisor, IBM Security, talks about issues concerning enterprise security and the reason for low investments in mobile app security.
We build a platform that is secure by design and we believe that, if you are building a fundamental block in a secure manner, then eventually how you access services is irrelevant because the basic building block is secure, says Parag Arora, area vice president - India, Citrix.
Examining the perceived disadvantages and the significant truths about automation’s role in cyber security
An upcoming competition will invite the public to propose and test 'quantum-resistant' encryption schemes
Pre-packaged encryption, DDoS and news feed for tech-light jihadists
The company calls in our manager to take a look around at a small software company it’s acquiring — after the deal has been signed
A friend’s company is hit with aggressive ransomware and calls our manager for advice
Restrictions are abhorrent and a draft bill in the Senate is overly broad and ambiguous. But if Congress insists on restrictions, let's add some critical limits.
From data breaches to digital extortion, the 2016 Symantec Internet Security Threat Report provides insights into the murky world of digital threats.
The internet has no limits as attacks can come from all over the world. Attackers are global, profit driven individuals. They don’t see nationality, but only IP addresses and lump some gains.
On April 1, 1976, Steve Jobs, Steve Wozniak and Ronald Wayne founded Apple Computer Inc. to sell a personal computer kit. 40 years later, the company, now called Apple, is the largest IT company by revenue in the world. How did it happen?