Sebi to chart out long term cyber security plan amid data breach scare – Business Standard

Sebi to chart out long term cyber security plan amid data breach scare
Business Standard
Sebi will deliberate with its board members next month on putting in place a long term cyber security framework for markets amid concerns over malicious software script targeting systems and possible data breaches. With technology-based platforms and …

and more »

data breach – Google News

Pepperoni Pizza Mac & Cheese (a frozen Mac hack)

Frozen single-serve macaroni and cheese is a favorite in my household and offers a quick comfort food option. With just a few ingredients it is transformed into a whole new dish, Pepperoni Pizza Mac & Cheese. It takes no more time for this frozen mac …
mac hacker – read more

Tech wrap: Wis. OKs $3B Foxconn deal; NASA launch; celebrating Voyager (+ video); HBO fights hackers – WRAL Tech Wire


WRAL Tech Wire

Tech wrap: Wis. OKs $ 3B Foxconn deal; NASA launch; celebrating Voyager (+ video); HBO fights hackers
WRAL Tech Wire
Foxconn announced three weeks ago it planned to invest $ 10 billion in Wisconsin on the first liquid crystal display panel factory located outside of Asia. The company, which employs about 1 million people in China, said it could eventually hire 13,000

and more »

China hackers – read more

6 things you need to know about IoT security

Security, trust and data integrity
IoT security

Image by Thinkstock

The emergence of IoT is altering our personal technology security paradigm and is a game-changer in customer/business interaction, in part due to the wide scope of available data and sheer number of devices collecting this data. McKinsey & Company estimates the IoT ecosystem will generate $ 6 trillion in value by 2025. Successful IoT offerings rely on the perception of benefit they can deliver to businesses and consumers while creating a proportionate foundation of security, trust, and data integrity. There are important ways that IoT technology can reduce data security risk while improving customer experience in a connected world.

To read this article in full or to leave a comment, please click here

Network World Security