Security

Case Study

How Manappuram Finance Optimized Security with the Help of Technology

In the face of severe security threats regarding safeguarding gold ornaments, Manappuram Finance introduces Remote Video Surveillance and Automatic Intrusion Alert Management System to counter the risks at hand. 

More

Feature

Are Smart Cars Putting Our Safety at Risk?

Smart cars are savvy, technologically advanced, and computerized devices connected to navigation and entertainment systems, but they also record personal data and have the potential to be hacked. Who owns that information, how it is shared, and how manufacturers can protect against hacking remains unregulated, which is why Sen. Edward Markey (D-Mass.) wants drivers protected.

The State of Open Source Security

Almost every commercial software application makes use of open source and proprietary components sold by third-party firms, but software firms may have a cursory notion of the quality and origin of all that code. Often, the reach and impact of vulnerabilities become known only after disaster strikes.

How to Prevent Ransomware: What one Company Learned the Hard way

In the real world, kidnapping is a risky crime--getting paid usually means getting caught. In the digital world, however, demanding ransom for data, or ransomware, is an escalating epidemic, a popular crime which is leaving many businesses and consumers at risk of losing data.

More

How-To

Better Open Source Hygiene Would have Spooked GHOST

Software security should be pre-emptive instead of reactive

How to Achieve Better Third-party Security

No enterprise is an island. In a connected world, a business cannot function without multiple relationships with third parties--outside vendors, contractors, affiliates, partners, and others.

More

Interview

Security-as-a-Service is a Real Business Enabler for CIOs : Pekka Usva, F-Secure

Decision-makers in enterprises often wrongly differentiate between the security requirements during the PC era as opposed to post-PC era. Consequently, mobile security does not feature high on their list of priorities, which I believe should happen ASAP, says Pekka Usva.

Adapt Multiple-layered, Multi-engine Defence Strategy: David Wigley, ContentKeeper

Content Security today requires a comprehensive multi-layered approach utilising multiple technologies, says David Wigley, CEO, ContentKeeper.

'Security made Simple' Vision Empowers CIOs: Sophos CEO Kris Hagerman

Combining great technology - that is well deployed, well maintained - with user base conscious of the threat landscape results in effective security posture, says Kris Hagerman, Chief Executive Officer, Sophos.

More

Video

Computerworld Tech Update 06 - 10 Jan, 2014

In this roundup of tech news from ComputerWorld for the week 06 - 10 January, 2014, we talk about the status of Microsoft's CEO search, NASSCOM appointing a new president, wearable tech making a strong showing at CES 2014, Intel dropping the McAfee name, and Tablets out-shipping PCs in the current year.

Computerworld Tech Update: 02 - 06 December, 2013

In this roundup of tech news from ComputerWorld for the week 02 - 06 December, 2013, we talk about Amazon Drone, Twitter fake followers, Indian Smartphone market, Botnet and Google's Compute Engine.

Computerworld Tech Update: 18 - 22 Nov, 2013

In this roundup of tech news for the week 18 - 22 November, 2013 we talk about Google, Yahoo, Microsoft, Salesforce.com and the Indian IT market.

More

News

DDOS Attacks Less Frequent Last year, More Dangerous

The total number of distributed denial of service attacks declined steadily last year, from more than 450,000 attacks in the first quarter to fewer than 150,000 in the fourth quarter -- but the size and complexity of the average attack both increased, according to a new report from Black Lotus Communications.

New Mobile-malware Detection Technique uses Gestures

Mobile malware is a growing problem, but researchers from University of Alabama at Birmingham have figured out a new way of detecting when shady mobile apps get up to no good, such as trying to call premium-rate numbers unbeknowst to a phone's owner.

Is this the Future of Online security? Why uQontrol thinks its Qkey is Different

Startup launches affordable 'three-factor' authentication for the masses

More

Opinion

Yahoo: One Giant Step--Sideways?

Authentication is the biggest issue that enterprises have to face in a connected world because all systems have flaws.

Nail the Lie

You’d think that the increase in the number of breaches and their financial impact would increasingly make security a boardroom topic. Nothing could be further from the truth. 

Security Innovation: Where will it Come from Next?

Silicon Valley, where I live and work, is the obvious answer as to where to find the most innovative security products. Money flows up and down Sand Hill Road, showcase offices spring off of University, startups gather on either side of the 101 from San Jose to San Francisco, and deals are being made daily at coffee shops like Philz, RedRock, and Coupa (where a latte costs .007 bitcoin!).

More

Slide-Show

10 Mistakes Companies Make After a Data Breach

In a recent presentation for The International Association of Privacy Professionals (IAPP) Privacy Academy, Michael Bruemmer of Experian Data Breach Resolution outlined some the common mistakes his firm has seen as organizations deal with the aftermath of a breach.

State of the Internet

If you are a looking to understand the internet spectrum, from knowing which country contributes the most to the attack traffic, to, which country boasts having the highest internet speeds, Akamai’s “State of the Internet” report is a good place to start from.

9 Apps That Should be Blacklisted in Your BYOD Policy

Not all apps are fun. Some apps are virtual Trojan horses that swipe personal data when consumer's are not looking and become a serious security threat if you employees also bring personal devices to work. Appthority has put together a list of some of the worst offenders for you to blacklist off in your BYOD policy.

More