Technology

The Invisible Face of Risk

We all know that animosity from a disgruntled employee can
Read More

Domino's India on Hackers' Menu; CISOs React

A Turkish hacker group attacked the website of one of
Read More

Is a Password Enough? A Closer Look at Authentication

Yahoo recently reported the theft of some 400,000 user names
Read More

Ignore Social Media at Your Own Peril

Every business today, big or small, has its eyes and
Read More

Five Tips on How to Prevent the Next Data Breach

You may be aware of the uber techie bad boy
Read More

The Changing Face of Enterprise Mobility

Today, along with employees the enterprise information in also on
Read More

Homegrown Technologies to Thwart Cyber Attacks

India should focus on homemade technology to fend off cyber
Read More

Security Measures to Protect Business Twitter Accounts

Hacking a business Twitter account seems to be a favorite
Read More

BYOD: Need for a Strict Access Management Policy

The rapid growth in smartphone and tablet usage by people,
Read More

CISO 2.0: Enterprise Umpire or Wide Receiver?

There's a pretty well-known characteristic among umpires. Just about any
Read More

Data Privacy: Who Will Bell the Cat?

As the use of mobile phones and social networking and
Read More

Social Media Blackout: Which Side of the Fence Are You?

A US college Provost ordered a week-long social media blackout
Read More

The Social Media Honey Trap

Are you sick and tired of your current job? cnbc.
Read More

CISO: Time to Think Out of the Box

At a conference where I spoke recently, the big question
Read More

BYOD is a Journey at CSC India

Most large enterprises are opening up to the concept of
Read More