When IBM unveiled BIOS - Basic Input/Output System - in 1981 with the introduction of its personal computer, few perceived it as a security threat. But now, NIST has issued a new guide to mitigate BIOS vulnerabilities in servers.
Experts review new allegations that have emerged about information security practices at Home Depot in the wake of the retailer confirming that it suffered a data breach resulting in the theft of an unknown quantity of credit and debit cards details.
When it comes to the evolution of machine data, security organizations now can improve protection and the top line. How can they maximize the business benefits? Jean-Francois Roy of Tibco shares tips.
In an exclusive interview, Sameer Ratolikar, CISO at Axis Bank, shares his insights on managing security and complying with RBI guidance and industry standards at India's third largest private bank.
Security experts see good news and bad in Apple's latest announcements. Upsides include Apple Pay and numerous privacy and security improvements in iOS 8. But after the celebrity photo leak, iCloud fixes remain missing.
Amidst a year of high-profile and costly data breaches, what can organizations be doing to help ensure they aren't the next victims? Charley Chell of CA Technologies discusses new authentication solutions.
India is the world's 4th biggest target of mobile malware, according to a new report, with New Delhi hosting the highest number of SMS attacks sending mobile malware. How can organizations reduce their risks?
Now that Home Depot has confirmed its payments breach, industry experts weigh the possibility that the home-improvement giant's attack is linked to earlier breaches at Target, Sally Beauty and P.F. Chang's.
Apple's advice to always use strong passwords and two-factor authentication ignores that image hackers are bypassing those controls - and celebrities aren't the only victims. Here's what needs to change.
Amidst a year of high-profile and costly data breaches, what can organizations be doing to help ensure they aren't the next victims? Charley Chell of CA Technologies discusses new authentication solutions.
Salesforce.com, a cloud-based customer relationship management provider, warns that malware known as Dyre is targeting certain customers. The company sees no evidence that any users have been impacted.
Apple plans to add safeguards to help address security vulnerabilities exploited by celebrity photo hackers. But some security experts contend that the proposed changes won't block iCloud account hackers.
Taking cues from the U.S. Secret Service and Department of Homeland Security, CERT-In has issued an advisory about the Backoff point-of-sale malware, which is said to have infected more than 1,000 U.S. merchants.
To avoid the corporate equivalent of the recent celebrity photo dump from iCloud, enterprise security managers must add stronger password, encryption and authentication controls to mobile devices.
Enterprises need to think beyond malware, breaches and insider threats when assessing information security. Keeping hardware up and running - available - is a crucial aspect of securing essential data.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.