Muthoot Fincorp CIO, Nilakantan Krishnan, adopted a combination of technologies like IoT, mobility and cloud to secure its branches and brought down pending issues from 40 percent to 26 percent.
PayPal lures the masses to locate chinks in its armor after a recent cross-site scripting bug exposed a critical vulnerability in its website.
Payment pro PayPal recently migrated from VMware to OpenStack. Sri Shivananda, the man who spearheaded the migration talks about the rationale behind the move, and shares his two cents' worth for CIOs contemplating a cloud switch.
Forget your password and complicated bank forms. Indian banks are presenting a whole new range of biometrics for hassle-free transactions.
Computer viruses and super-villains have more in common than you thought. An analogy between the two seemingly-disconnected entities proves why.
Having policies in place can help keep employees from walking out the door with company information.
Clean out and restore your PC to its pristine state.
Not all router security issues can be fixed by users, but there are many actions that can be taken to protect them from attacks
Experts in ecommerce, security, marketing and customer service discuss the best ways to foster trust with your consumers – and build a loyal customer base.
Network designers and CIOs should look at each network security component individually and make a choice based on the capabilities of that component, says Mark Riley, CTO, ContentKeeper.
Red Hat’s think tank has always sworn by open-source, and believes that it’s the key to unleashing next-gen technologies. With IoT storming the enterprise, the pitch remains the same. Here’s why Red Hatters believe open-source is where you ought to put your money.
Simply put, deception technology uses decoys to misdirect the attacker and prevent him/her from going deeper into the network and reaching the intended target. A conversation with Rajpreet Kaur, senior research analyst, Gartner reveals how ‘honey-trapping’ hackers could give you a leg up.
InfoWorld talks with GitHub's Jamesha Fisher about the cultural shifts necessary for baking security early into the devops process
Network World chats with John Hurley, CEO of SmartFile, about how enterprise IT departments can embrace "rogue users" and "Shadow IT" instead of shutting them down.
"We are becoming the de facto standard when it comes to encryption," says Rahul Kumar, Country Manager, WinMagic India.
The move appears to be a precautionary measure
An Israeli security firm allegedly targeted Ahmed Mansoor, an activist in the United Arab Emirates
Pegasus exploit discovered when used against a human rights activist
A centralized approach that governs how apps interact and what they are allowed to do is essential
New EU regimes are under consideration, but currently uncertainty reigns
Given the success of ransomware, we need to look deeper for solutions beyond those mentioned most frequently. Here are are few of these solutions.
When tragedy takes the form of a hurricane or a mass shooting, fraudsters use the reach and anonymity of internet to exploit grief. Watch out for them.
The economic operating system of the world will be rewritten as the future holds no ordinary disruptions. Be prepared to face the new reality as we walk you through the technological innovations that will hit you soon.