Close

Security

Feature

How MDM Works -- or Doesn't Work -- for SMBs

Not every company is big enough to implement traditional MDM solutions, but the smaller ones are still trying to find ways to manage their corporate data.

Big Data to Tame the Wolves of Wall Street

With the increasingly stringent regulatory requirements to tame the latest wolves of Wall Street, more financial institutes are turning towards proactive monitoring tools to avoid fraud. As big data is becoming a helpful tool to detect and alert potential fraud, the technology is also raising concern over its impact on personal data privacy.

CIO Not the Only One to Blame for Target Breach

'You almost have to be a superhuman with 25 hours a day to spend on security issues to be an effective large retailer CIO these days. And that simply doesn't exist.'

More

How-To

How to Test the Security Savvy of Your Staff

How do you know your employees retain what you teach them in company-required security awareness training? You don't -- unless you regularly test their security savvy and effectively address their mistakes during post-test follow-up sessions.

How to Find Out if Someone has been Snooping in Your Gmail

Your Gmail account probably contains some sensitive information--emails from your friends and family members, information about accounts for other services, candid pictures, you name it. What if someone else has been poking around in there? Fortunately, Google gives you the tools necessary to find out.

5 Tips to Keep Your Data Secure on the Cloud

So with all the legal uncertainty around cloud you simply have no choice but to take control and be responsible for your own data. Here are five data privacy protection tips to help you tackle the issue of cloud privacy.

More

Interview

My Job is to Hallucinate: Unisys CTO

Jim Thompson, CTO, Unisys, talks to Computerworld India about the company’s Forward! solution, the state of the Unix mission critical market and how India figures in Unisys’s future plans.

Our Unique Pricing Model is a Deal Clincher: Niall King, Barracuda

Niall King, Regional VP, APAC, Barracuda Networks, talks about the competition, trends in its customer space, and why its USPs make it a vendor of choice among Indian organizations.

Magnasoft Northstar: The Cloud Was a Natural Fit for Us

The Head of Product Development Division, Magnasoft Northstar, Kunal Ashar talks about how the cloud has helped the company to grow and be more competitive in the market.

More

Video

Computerworld Tech Update 06 - 10 Jan, 2014

In this roundup of tech news from ComputerWorld for the week 06 - 10 January, 2014, we talk about the status of Microsoft's CEO search, NASSCOM appointing a new president, wearable tech making a strong showing at CES 2014, Intel dropping the McAfee name, and Tablets out-shipping PCs in the current year.

Computerworld Tech Update: 02 - 06 December, 2013

In this roundup of tech news from ComputerWorld for the week 02 - 06 December, 2013, we talk about Amazon Drone, Twitter fake followers, Indian Smartphone market, Botnet and Google's Compute Engine.

Computerworld Tech Update: 18 - 22 Nov, 2013

In this roundup of tech news for the week 18 - 22 November, 2013 we talk about Google, Yahoo, Microsoft, Salesforce.com and the Indian IT market.

More

News

Mystery Malware Steals Apple Credentials from Jailbroken iOS Devices

A malware campaign of yet-to-be-determined origin is infecting jailbroken iPhones and iPads to steal Apple account credentials from SSL encrypted traffic.

McAfee Outlines Integrated Security Strategy

Gone are the days when a company could deploy a standalone security appliance to protect an entire network, McAfee network security general manager, Pat Calhoun says.

Supposedly Patched Router Backdoor still Opens: Researcher

The security researcher who first found a vulnerability affecting more than 20 different router models says the patch meant to fix it only hides the initial weakness and doesn't remove it whatsoever.

More

Opinion

IT Departments are a Dying Breed

Earlier this week, I posted a question to Twitter and one reader offered an interesting rant on the topic, one that I felt was worth sharing.

The Real Security Lesson Windows XP Taught us is to Challenge Our Assumptions

As support for Windows XP comes to an official end, the real security lesson is hidden. Broader than what to do about it today is the consideration of what it means for the future.

Big Data can Lead to Big Security Problems for Asia Pacific Firms

Data is powerful -- but it's also dangerous. The wrong data falling into the wrong hands can have devastating consequences.

More

Slide-Show

10 Mistakes Companies Make After a Data Breach

In a recent presentation for The International Association of Privacy Professionals (IAPP) Privacy Academy, Michael Bruemmer of Experian Data Breach Resolution outlined some the common mistakes his firm has seen as organizations deal with the aftermath of a breach.

State of the Internet

If you are a looking to understand the internet spectrum, from knowing which country contributes the most to the attack traffic, to, which country boasts having the highest internet speeds, Akamai’s “State of the Internet” report is a good place to start from.

9 Apps That Should be Blacklisted in Your BYOD Policy

Not all apps are fun. Some apps are virtual Trojan horses that swipe personal data when consumer's are not looking and become a serious security threat if you employees also bring personal devices to work. Appthority has put together a list of some of the worst offenders for you to blacklist off in your BYOD policy.

More