Goldmine remains for enterprise security, search for silver bullet continues Mohd Ujaley Feb 26, 2016 While corporations claim of robust security policies in place, the sustained ascendancy of cyber attacks is continuing to put most…
TCS Secures Critical Data With PIM Abhishek Raval Feb 19, 2016 TCS transitioned from manual systems for privileged user access and password management to Secured Access by implementing ARCOS, a…
Looking to invest more in India: Trend Micro Mohd Ujaley Jan 26, 2016 Trend Micro is geared to meet the demand for security solutions coming from integrated digital footprint created by Digital India…
Digital rights group accuses Google of invading privacy Rashi Varshney Dec 2, 2015 Google is dissecting the activities of students in kindergarten through 12th grade so it can improve its digital services
Surviving in the IoT world: Risks of Smart Home Devices Rashi Varshney Nov 10, 2015 Taking a random selection of the latest Internet-of-Things (IoT) products, Kaspersky Lab researchers have discovered serious…
Apple Inc removes some apps from online store over security concerns Rashi Varshney Oct 9, 2015 Apple Inc said that it had removed "a few" applications from its App Store, expressing its concern that the security of some…
IT Security: ‘Are we leaving the main door open?’ Rashi Varshney Sep 30, 2015 The major drivers for security that we would notice in India will be across wide sectors like banks, FSIs, IT/ITES, manufacturing…
Smart City has to be a ‘Safe City’ for attracting private investment: Verint Systems Mohd Ujaley Sep 24, 2015 A Smart City basically comprises of better infrastructure, upgraded public transport, self-sufficient and efficient power, water…
Intel Security names Richard Steranka to Lead Global Partner Efforts Rashi Varshney Aug 25, 2015 Former Vice President of Avaya’s Worldwide Partner Organization to bring proactive security to global partner network
Data theft: When attackers steal more than just money Mohd Ujaley Aug 21, 2015 While monetisation of data on the black market remains the primary motivation, hacktivists steal data for numerous reasons.