Security

Feature

How to remain (mostly) invisible online

With such a heavy reliance on the Internet for all sorts of interactions and transactions and the many ways people are connected via their mobile or desktop devices, is it possible to remain invisible online?

Make in India : Indusface

Vadodara based Indusface aspires to be a global market leader in the application security space with its integrated "Total Application Security” solution.

What to Watch Out For in 2015: EY

Milan Sheth, partner and technology sector leader, Ernst & Young, says there’s a lot of reason for the IT industry to be positive about 2015.

More

How-To

How to Achieve Better Third-party Security

No enterprise is an island. In a connected world, a business cannot function without multiple relationships with third parties--outside vendors, contractors, affiliates, partners, and others.

How to Protect Yourself Against Privileged User Abuse

The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE).

How to Test the Security Savvy of Your Staff

How do you know your employees retain what you teach them in company-required security awareness training? You don't -- unless you regularly test their security savvy and effectively address their mistakes during post-test follow-up sessions.

More

Interview

'Security made Simple' Vision Empowers CIOs: Sophos CEO Kris Hagerman

Combining great technology - that is well deployed, well maintained - with user base conscious of the threat landscape results in effective security posture, says Kris Hagerman, Chief Executive Officer, Sophos.

My Job is to Hallucinate: Unisys CTO

Jim Thompson, CTO, Unisys, talks to Computerworld India about the company’s Forward! solution, the state of the Unix mission critical market and how India figures in Unisys’s future plans.

Our Unique Pricing Model is a Deal Clincher: Niall King, Barracuda

Niall King, Regional VP, APAC, Barracuda Networks, talks about the competition, trends in its customer space, and why its USPs make it a vendor of choice among Indian organizations.

More

Video

Computerworld Tech Update 06 - 10 Jan, 2014

In this roundup of tech news from ComputerWorld for the week 06 - 10 January, 2014, we talk about the status of Microsoft's CEO search, NASSCOM appointing a new president, wearable tech making a strong showing at CES 2014, Intel dropping the McAfee name, and Tablets out-shipping PCs in the current year.

Computerworld Tech Update: 02 - 06 December, 2013

In this roundup of tech news from ComputerWorld for the week 02 - 06 December, 2013, we talk about Amazon Drone, Twitter fake followers, Indian Smartphone market, Botnet and Google's Compute Engine.

Computerworld Tech Update: 18 - 22 Nov, 2013

In this roundup of tech news for the week 18 - 22 November, 2013 we talk about Google, Yahoo, Microsoft, Salesforce.com and the Indian IT market.

More

News

DDOS Attack Size up 50-fold Over Past Decade

The size of the largest DDOS attack was fifty times larger last year than ten years ago, according to a new survey of Internet service and hosting providers, and attacks are also increasing in numbers and in sophistication.

New Chrome Extension Spots Unencrypted tracking

TrackerSSL is aimed at alerting websites of insecure tracking via Twitter

'Ghost' Vulnerability Poses High Risk to Linux Distributions

The flaw in the GNU C Library can be exploited remotely for full control, according to Qualys

More

Opinion

Will 2015 Be the Year We Say Goodbye to Passwords?

While passwords are a cost effective security measure, they are not under the control of the organisations unlike many other security control. 2015 might see enterprises switching to two step authentication and non standard security methods like biometrics.

Sony and Chase: Don't blame the CISO

No chief information security officer has ability to stop all attacks all the time.

Security Manager's Journal: Trapped: Building Access Controls Go Kablooey

Doors just stop working when one old PC in a storage closet dies.

More

Slide-Show

10 Mistakes Companies Make After a Data Breach

In a recent presentation for The International Association of Privacy Professionals (IAPP) Privacy Academy, Michael Bruemmer of Experian Data Breach Resolution outlined some the common mistakes his firm has seen as organizations deal with the aftermath of a breach.

State of the Internet

If you are a looking to understand the internet spectrum, from knowing which country contributes the most to the attack traffic, to, which country boasts having the highest internet speeds, Akamai’s “State of the Internet” report is a good place to start from.

9 Apps That Should be Blacklisted in Your BYOD Policy

Not all apps are fun. Some apps are virtual Trojan horses that swipe personal data when consumer's are not looking and become a serious security threat if you employees also bring personal devices to work. Appthority has put together a list of some of the worst offenders for you to blacklist off in your BYOD policy.

More