Advanced persistent threats are on the rise. It is time for CISOs to move beyond the traditional security measures.
Jitendra Nath, CIO, Indian School of Business, talks about how the institution is using technology to improve every student’s learning experience.
As India celebrates the spirit of independence, Indian CIOs crack the code to freedom from the ‘support function’ tag.
No enterprise is an island. In a connected world, a business cannot function without multiple relationships with third parties--outside vendors, contractors, affiliates, partners, and others.
The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE).
How do you know your employees retain what you teach them in company-required security awareness training? You don't -- unless you regularly test their security savvy and effectively address their mistakes during post-test follow-up sessions.
Jim Thompson, CTO, Unisys, talks to Computerworld India about the company’s Forward! solution, the state of the Unix mission critical market and how India figures in Unisys’s future plans.
Niall King, Regional VP, APAC, Barracuda Networks, talks about the competition, trends in its customer space, and why its USPs make it a vendor of choice among Indian organizations.
The Head of Product Development Division, Magnasoft Northstar, Kunal Ashar talks about how the cloud has helped the company to grow and be more competitive in the market.
In this roundup of tech news from ComputerWorld for the week 06 - 10 January, 2014, we talk about the status of Microsoft's CEO search, NASSCOM appointing a new president, wearable tech making a strong showing at CES 2014, Intel dropping the McAfee name, and Tablets out-shipping PCs in the current year.
In this roundup of tech news from ComputerWorld for the week 02 - 06 December, 2013, we talk about Amazon Drone, Twitter fake followers, Indian Smartphone market, Botnet and Google's Compute Engine.
In this roundup of tech news for the week 18 - 22 November, 2013 we talk about Google, Yahoo, Microsoft, Salesforce.com and the Indian IT market.
Apple turned on two-factor authentication for iCloud, which will protect against the kind of social engineering exploits that helped hackers steal celebrity photos last month.
Cisco has adopted a "threat-focused" approach with its latest ASA firewall.
The Internet of Things (IoT) will create additional security risks for businesses and consumers, according to network security experts at the APNIC 38 conference in Brisbane.
Doors just stop working when one old PC in a storage closet dies.
A few years ago, the idea of home and office appliances being connected to a network, may have seemed strange. Today, however this is fast becoming a reality, as technology continues to develop and evolve, increasing in complexity and sophistication.
Everybody has heard about Facebook's creepy, secret, psychological experiment designed to see if negative newsfeed posts inspire more negativity -- and vice versa. I too was weirded out by the revelations, feeling manipulated and that my privacy had been invaded upon.
In a recent presentation for The International Association of Privacy Professionals (IAPP) Privacy Academy, Michael Bruemmer of Experian Data Breach Resolution outlined some the common mistakes his firm has seen as organizations deal with the aftermath of a breach.
If you are a looking to understand the internet spectrum, from knowing which country contributes the most to the attack traffic, to, which country boasts having the highest internet speeds, Akamai’s “State of the Internet” report is a good place to start from.
Not all apps are fun. Some apps are virtual Trojan horses that swipe personal data when consumer's are not looking and become a serious security threat if you employees also bring personal devices to work. Appthority has put together a list of some of the worst offenders for you to blacklist off in your BYOD policy.