Network and endpoint security, VPNs and remote access solutions, Identity management and authentication, Data loss prevention technologies
Windows and other OS security best practices, Vulnerability and patch management, Secure application development and coding
Viruses, worms, spyware, and other malware, Email and instant messaging threat defenses, Application and Web threat defenses, Hacking countermeasures
Incident response management best practices, Enterprise risk management strategies, Information security policies & end-user awareness, Business compliance management, Information security certifications and training
Join SearchCIO and CIO expert Harvey Koeppel for a tweet jam Dec. 18 to discuss your top New Year's IT resolutions.
As healthcare IT spending in India is set to increase 7% next year CIOs must focus on the front end to ensure they get value from back-end modernization and meet the government’s goals to improve accessibility to health services
Gartner predicts Indian banks will increase IT spending next year by almost 10% as the Indian government awards more banking licenses
Indian organizations will spend $404m on cloud services by the end of 2013, representing a 33.6% increase over 2012, according to Gartner
Server managers detail their data center plans for 2014 and offer insights into the systems management and career challenges they face.
54.8% of Indian CIOs will increase their cloud computing budgets in 2014, with software as a service (SaaS) the most common
Reports are pointing to big data as the top IT investment priority for Indian businesses in 2014 as organizations recognize the benefits
Hadoop confronts deployment teams with unfamiliar challenges, particularly with knowledge of its inner workings still elusive in many organizations.
Big data has a range of practical and commercial benefits to businesses but can be fraught with privacy and legal issues
Learn how DOM-based XSS attacks differ from typical cross-site scripting attacks, and learn best practices for defending against them.
The Minneapolis-based retailer said a massive data breach, one of the largest in retail history, occurred over the holiday shopping period.
Enterprise threats expert Nick Lewis explores how analysis of a newly discovered APT tool, PinkStats, may help enterprise APT defense.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
The latest variant of the banking Trojan is causing numerous problems, Symantec said.