In the face of severe security threats regarding safeguarding gold ornaments, Manappuram Finance introduces Remote Video Surveillance and Automatic Intrusion Alert Management System to counter the risks at hand.
Recycling is generally a good thing. But it may not be such a good thing when it comes to digital devices -- smartphones, tablets and laptops.
According to Apple, the Apple Watch will communicate with the iPhone via WiFi and Bluetooth. That creates a potential opportunity for attackers to spoof one device or another.
CIOs and CISOs should prioritize investments and first invest in areas more risky and profitable, says Sunil Sharma, VP-Sales and Operations, India & SAARC, Cyberoam (a Sophos company)
Software security should be pre-emptive instead of reactive
No enterprise is an island. In a connected world, a business cannot function without multiple relationships with third parties--outside vendors, contractors, affiliates, partners, and others.
Decision-makers in enterprises often wrongly differentiate between the security requirements during the PC era as opposed to post-PC era. Consequently, mobile security does not feature high on their list of priorities, which I believe should happen ASAP, says Pekka Usva.
Content Security today requires a comprehensive multi-layered approach utilising multiple technologies, says David Wigley, CEO, ContentKeeper.
Combining great technology - that is well deployed, well maintained - with user base conscious of the threat landscape results in effective security posture, says Kris Hagerman, Chief Executive Officer, Sophos.
Intel is driving IoT framework or reference architecture from sensors to the back end servers and analysis across the ecosystem of tech vendors, developers, systems integrators and CIOs. It’s not about bits and bytes from a digital perspective but one needs to know temperature, location and other aspects. But it will require interesting new skillsets at the organisation end across the entire spectrum to the likes of information scientists, data partitioners, networking experts to drive the true benefits of IoT, says Narendra Bhandari, Director, Software & Services Group, Intel Asia Pacific.
In this roundup of tech news from ComputerWorld for the week 06 - 10 January, 2014, we talk about the status of Microsoft's CEO search, NASSCOM appointing a new president, wearable tech making a strong showing at CES 2014, Intel dropping the McAfee name, and Tablets out-shipping PCs in the current year.
In this roundup of tech news from ComputerWorld for the week 02 - 06 December, 2013, we talk about Amazon Drone, Twitter fake followers, Indian Smartphone market, Botnet and Google's Compute Engine.
Optus Business has partnered Microsoft to offer enterprise and government customers an Azure enabled solution on the software giant's Cloud OS network.
Google plans to serve most of its ads over encrypted HTTPS connections by the end of June, a move that will protect against some ad hijacking attacks and will encourage website owners to enable encryption on their Web properties.
Computers in more than 50 countries are infected with a new version of Pushdo, a spamming botnet that has been around since 2007 and survived several attempts to shut it down.
Underscoring the seriousness of recent cyber-attacks, the Obama Administration is seeking to establish cybersecurity standards and enact new federal laws to cover cybercrimes. The common thread throughout these recent announcements has been the importance of collaboration among business and government sectors to stop cyber-attacks and strengthen national security. However, it remains to be seen which of these proposals, if any, will be enacted into law. It is equally uncertain whether the protections afforded to the business community will satisfy businesses, or take into account the practical issues that they face every day.
Authentication is the biggest issue that enterprises have to face in a connected world because all systems have flaws.
You’d think that the increase in the number of breaches and their financial impact would increasingly make security a boardroom topic. Nothing could be further from the truth.
In a recent presentation for The International Association of Privacy Professionals (IAPP) Privacy Academy, Michael Bruemmer of Experian Data Breach Resolution outlined some the common mistakes his firm has seen as organizations deal with the aftermath of a breach.
If you are a looking to understand the internet spectrum, from knowing which country contributes the most to the attack traffic, to, which country boasts having the highest internet speeds, Akamai’s “State of the Internet” report is a good place to start from.
Not all apps are fun. Some apps are virtual Trojan horses that swipe personal data when consumer's are not looking and become a serious security threat if you employees also bring personal devices to work. Appthority has put together a list of some of the worst offenders for you to blacklist off in your BYOD policy.