Network and endpoint security, VPNs and remote access solutions, Identity management and authentication, Data loss prevention technologies
Windows and other OS security best practices, Vulnerability and patch management, Secure application development and coding
Viruses, worms, spyware, and other malware, Email and instant messaging threat defenses, Application and Web threat defenses, Hacking countermeasures
Incident response management best practices, Enterprise risk management strategies, Information security policies & end-user awareness, Business compliance management, Information security certifications and training
While consumers in the US and China show some interest in paying for goods using smartwatches, Brits are less interested, according to global research.
The Indian government will spend $7.2bn on IT in 2015, with IT and BPO services the biggest area of investment, says Gartner
Indian private bank Yes Bank is using software from SunTec for revenue management and business assurance
Microsoft Azure cloud CTO Mark Russinovich identified ten key security risks of public cloud services.
Microsoft is planning to offer cloud services – Azure and Office 365 – in India from local datacenters by the end of 2015
India is expected to be the second fastest-growing data center infrastructure market in Asia-Pacific in 2015
Spending on enterprise applications in 2014 will grow faster than any other segment of the software market in India
SAP has extended its long-standing partnership with IBM by making IBM's open cloud platform the infrastructure to run SAP Hana Enterprise Cloud.
Google is planning to enable faster online search capability for mobile phones in India
A variety of malware that steals passwords from jailbroken iPhones and iPads is becoming an enterprise concern. Expert Nick Lewis explains how to mitigate the risk.
The October 2014 Oracle CPU delivered fixes for 154 unique bugs, with Java vulnerabilities making up the bulk of the most pressing updates.
News roundup: New research shows a dramatic increase in the cost of cybercrime and data breach remediation. Plus: Security as a service popularity surges, Snowden journalist touts the importance of free security software, and more.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process.
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.