PayPal lures the masses to locate chinks in its armor after a recent cross-site scripting bug exposed a critical vulnerability in its website.
Payment pro PayPal recently migrated from VMware to OpenStack. Sri Shivananda, the man who spearheaded the migration talks about the rationale behind the move, and shares his two cents' worth for CIOs contemplating a cloud switch.
To provide better safety and security to its citizens, Mahindra Defence implements smart surveillance 2.0 in Lucknow.
With great power comes great responsibility -- and also a great big target painted on your head.
And what you can do about it
Symantec is a behemoth. With a turnover of approximately $6.6 billion last year, the company has grown rapidly through a patchwork series of acquisitions from 1984 to 2016.
Some of the most hackable devices in your network are also probably the most-overlooked.
Getting a little sloppy with your security? Time to shape up. Practice these five habits to protect your data at home, in the office and out in the world.
A system that mimics a human can be thought of as a system that generates an army of virtual analysts, but armies need leaders to direct and train them
Simply put, deception technology uses decoys to misdirect the attacker and prevent him/her from going deeper into the network and reaching the intended target. A conversation with Rajpreet Kaur, senior research analyst, Gartner reveals how ‘honey-trapping’ hackers could give you a leg up.
We have extended our technology expertise to emerge as the preferred security vendor for enterprises, says Parvinder Walia, APAC sales director, ESET.
According to Riverbed Global Application Performance Survey 2015, 98 percent of executives agreed that optimal enterprise application performance is essential for achieving optimal business performance, and can drive increased productivity, cost savings, and improved customer satisfaction. Nagendra Venkaswamy, Vice President, Riverbed India and SAARC shares his views and insights on the same.
"We are becoming the de facto standard when it comes to encryption," says Rahul Kumar, Country Manager, WinMagic India.
In a hyper-connected world, CISOs need multiple layers of defense and not just a ‘secure the breach’ approach, says Rana Gupta, vice president of APAC sales for identity and data protection at Gemalto.
CIOs should embrace hybrid infrastructure, analytics, security and mobility to innovate and stay ahead of the competition, says Neelam Dhawan, MD, HPE India.
A lone hacker named Guccifer 2.0 has tried to take credit
54% of authorities' demands for customer data accompanied by orders that bar Microsoft from telling customers
The malware redirects victims to perfect replicas of online banking websites
What is hard to understand is why LinkedIn didn’t feel the need to force password changes until four years after the breach
Breaches that weren’t have gotten a lot of attention — and that’s not such a bad thing
Why cyber attacks and data breaches will drive the need for cyber insurance in Indian enterprises.
The economic operating system of the world will be rewritten as the future holds no ordinary disruptions. Be prepared to face the new reality as we walk you through the technological innovations that will hit you soon.
Over the past 40 years, Windows has slowly caught up with the Mac. But despite the advances that Windows has made, the Mac is still a better system. Here's why.
From data breaches to digital extortion, the 2016 Symantec Internet Security Threat Report provides insights into the murky world of digital threats.