Technology

Five Tips on How to Prevent the Next Data Breach

You may be aware of the uber techie bad boy
Read More

The Changing Face of Enterprise Mobility

Today, along with employees the enterprise information in also on
Read More

Homegrown Technologies to Thwart Cyber Attacks

India should focus on homemade technology to fend off cyber
Read More

Security Measures to Protect Business Twitter Accounts

Hacking a business Twitter account seems to be a favorite
Read More

BYOD: Need for a Strict Access Management Policy

The rapid growth in smartphone and tablet usage by people,
Read More

CISO 2.0: Enterprise Umpire or Wide Receiver?

There's a pretty well-known characteristic among umpires. Just about any
Read More

Data Privacy: Who Will Bell the Cat?

As the use of mobile phones and social networking and
Read More

Social Media Blackout: Which Side of the Fence Are You?

A US college Provost ordered a week-long social media blackout
Read More

The Social Media Honey Trap

Are you sick and tired of your current job? cnbc.
Read More

CISO: Time to Think Out of the Box

At a conference where I spoke recently, the big question
Read More

BYOD is a Journey at CSC India

Most large enterprises are opening up to the concept of
Read More

Of Religious Sites, 'Lost' Phones and Security Nightmare

The Enterprise Mobility Summit, organized by DynamicCIO in Bengaluru recently,
Read More

India Becoming a Sitting Duck for Hacker Attacks

The security landscape in India and across the world has
Read More

Shriram Group says Hello to Buy Your Own Device (BYOD)

At Shriram Group, it has always been my effort to ensure
Read More

Consumerization of IT: Are you Ready for the Future?

The consumption of IT has transformed drastically in the last
Read More