IT Security: ‘Are we leaving the main door open?’ Rashi Varshney Sep 30, 2015 The major drivers for security that we would notice in India will be across wide sectors like banks, FSIs, IT/ITES, manufacturing…
Searching for goldmine in Smart Cities, Digital India and Enterprise Security Mohd Ujaley Sep 26, 2015 With the sluggish information management business (Veritas) out of the way, Symantec aims to explore new avenues to revive…
Smart City has to be a ‘Safe City’ for attracting private investment: Verint Systems Mohd Ujaley Sep 24, 2015 A Smart City basically comprises of better infrastructure, upgraded public transport, self-sufficient and efficient power, water…
Apple hack exposes flaws in building apps behind ‘Great Firewall’ Rashi Varshney Sep 23, 2015 A malicious programme, dubbed XcodeGhost, hit hundreds - possibly thousands - of Apple iOS apps, including products from some of…
Securing BFSI in Evolving Threat Landscape Ankush Kumar Sep 18, 2015 The 2015 Internet Security Threat Report from Symantec shows that the volume of targeted attacks against BFSI went up from 11.1…
Cyber attacks increasingly targeting physical infrastructure, says TrendMicro report Express News Service Sep 9, 2015 If ongoing studies in transportation security are any indication, attacks may be heading in a direction that could turn hacking…
A robust authentication system is the backbone of any security strategy Mohd Ujaley Sep 4, 2015 Deploying a robust authentication system becomes the first step, it forms the backbone of any security strategy. But, with plenty…
Cyber Security is going to be more challenging than oil crisis or military expansionism of the… Mohd Ujaley Sep 4, 2015 The biggest challenge before India will not be as much of oil crisis or water or the military expansionism of the neighbours, it…
New Facebook tool will identify ‘stolen’ video postings Agencies Sep 1, 2015 Soon it would not be easy to "steal" videos from Facebook as the social networking giant is introducing a video-matching tool
Editorial: Bolstering Cyber Security Mohd Ujaley Aug 31, 2015 The cyber criminals are succeeding because they have developed tremendous collaboration with each other—they share tools,…