Security

Case Study

Camera Corners Traffic Offenders and Criminals with ANPR Technology

To provide better safety and security to its citizensMahindra Defence implements smart surveillance 2.0 in Lucknow.

 

How Manappuram Finance Optimized Security with the Help of Technology

In the face of severe security threats regarding safeguarding gold ornaments, Manappuram Finance introduces Remote Video Surveillance and Automatic Intrusion Alert Management System to counter the risks at hand. 

More

Feature

They Fought the Law, The Law Won

Reading the headlines relating to cyber-security you would not be blamed for thinking we are in a losing battle against relentless foes. The breaches at OPM, Ashley Madison, Target, Sony, and many others highlight criminals are consistently looking for ways to breach our defences. It is understandable then why many CISOs may look nervously at their networks wondering if they will be the next victim, or worse, are they already a victim without knowing it.

How to surf the Dark Web for fun and profit

On the Dark Web, nobody knows who you are. The flip side of that, however, is that you also don't know who your business partners are.

More

How-To

Cloud Storage Alternatives: Three Ways to Sync your Own Data Securely and Privately

Robert D Lonsdale, Jr runs his business from two computers in different states. He needs to keep files synced between them, but he would "prefer not to use a cloud service."

How to Stop the Security Breach Tsunami

It seems like almost every week there is a new security breach in either the government or in private business. The latest had nothing to do with China, instead it appeared to be more of a revenge attack by one baseball team on another.

More

Interview

DSCI, NASSCOM Architecting Security for Digital Transformation: Nandkumar Saravade, DSCI

Nandkumar Saravade, CEO, Data Security Council of India (DSCI) says that DSCI and NASSCOM have realized the significance of cyber security quite early, and had included promotion of Indian cyber security companies as part of their trade delegations to the global market. 

Hacked Opinions: Vulnerability disclosure -- Jeff Williams

Contrast Security's Jeff Williams talks about disclosure, bounty programs, and vulnerability marketing with CSO, in the first of a series of topical discussions with industry leaders and experts.

SMBs Should Look at IoT from an Operational Efficiency Perspective: Srikanth Gopalakrishnan, SAP Labs

As IoT reaches the peak of its hype cycle, enterprises realize its significance, and how this technology can release them from few pain points, that they have going through for a long time. Srikanth Gopalakrishnan, Vice President Product Management, SAP Labs believes that Internet of Things will revolutionize operational processes. 

More

Video

'There's something wrong if your organization doesn't have a CISO yet'

The former Gartner fellow and Chief Evangelist at Metric Stream, French Caldwell tells us about what's the worst that can happen to organizations with little or no GRC guidelines.

Digital India to be Key Enabler for IoT: Narendra Bhandari, Intel

Intel is driving IoT framework or reference architecture from sensors to the back end servers and analysis across the ecosystem of tech vendors, developers, systems integrators and CIOs. It’s not about bits and bytes from a digital perspective but one needs to know temperature, location and other aspects. But it will require interesting new skillsets at the organisation end across the entire spectrum to the likes of information scientists, data partitioners, networking experts to drive the true benefits of IoT, says Narendra Bhandari, Director, Software & Services Group, Intel Asia Pacific.

Computerworld Tech Update 06 - 10 Jan, 2014

In this roundup of tech news from ComputerWorld for the week 06 - 10 January, 2014, we talk about the status of Microsoft's CEO search, NASSCOM appointing a new president, wearable tech making a strong showing at CES 2014, Intel dropping the McAfee name, and Tablets out-shipping PCs in the current year.

More

News

Fake Apple iOS Crash Reports Prove Tricky to Remove

Some Apple mobile users have been encountering a pop-up message that is particularly difficult to close.

DNS Server Attacks Begin Using BIND Software Flaw

Attackers have started exploiting a flaw in the most widely used software for the DNS (Domain Name System), which translates domain names into IP addresses.

Endpoint Security Firm SentinelOne Challenges Traditional Anti-virus Software

Next-generation endpoint protection vendor SentinelOne has received the same certification that many traditional antivirus platforms seek, meaning it can be considered suitable for meeting certain requirements of industry and governmental regulations.

More

Opinion

What can we learn from JPMorgan's insider breaches?

Another former JPMorgan Chase & Co. (JPMC) employee was recently arrested by the FBI on charges of stealing customer data and trying to sell it to an undercover informant for tens of thousands of dollars.

Why a strong password doesn't help as much as a unique one

You may snigger when you hear that a few months after the euphemistically named AdultFriendFinder was hacked, now Ashley Madison has had its turn. The site, which enthusiastically advertises its ability to connect people to have affairs, had its accounts compromised, according to security reporter Brian Krebs and confirmed by the company.

Aadhaar, IRCTC and the NJAC Eminences

Backed by a database that can be hacked into and changed, the NJAC may not really fix the perceived wrongs in the Supreme Court collegium system.

More

Slide-Show

10 Mistakes Companies Make After a Data Breach

In a recent presentation for The International Association of Privacy Professionals (IAPP) Privacy Academy, Michael Bruemmer of Experian Data Breach Resolution outlined some the common mistakes his firm has seen as organizations deal with the aftermath of a breach.

State of the Internet

If you are a looking to understand the internet spectrum, from knowing which country contributes the most to the attack traffic, to, which country boasts having the highest internet speeds, Akamai’s “State of the Internet” report is a good place to start from.

9 Apps That Should be Blacklisted in Your BYOD Policy

Not all apps are fun. Some apps are virtual Trojan horses that swipe personal data when consumer's are not looking and become a serious security threat if you employees also bring personal devices to work. Appthority has put together a list of some of the worst offenders for you to blacklist off in your BYOD policy.

More