Incident response management best practices, Enterprise risk management strategies, Information security policies & end-user awareness, Business compliance management, Information security certifications and training
Each industry vertical in India has its own set of BYOD related demons to contend with. For this feature, we spoke to industry leaders across several segments to get an idea of where India Inc. stands on the BYOD front.
Microsoft customers awaiting Windows 9 updates didn't hear details at WPC, where the company touted cross-platform support and mobile device plans.
What's your company doing about the Internet of Things? The Amazon CTO's list of IoT efforts in science, consumer products and sports should convince CIOs to get cracking: The Data Mill reports.
ITC Group might be over 100 years old but it is at the forefront of enterprise IT in India. CIO VVR Babu tells searchcio.in about his role at a company where he has worked for 35 years.
Amazon may be the king of the cloud world, but some customers find its data sovereignty assurances clear as mud.
Attempts by India’s global service providers to win business with large multinationals will benefit enterprises in the company
IT shops that want to use the cloud as the compute platform for some or all of their applications must first migrate those applications to the cloud, which is easier said than done.
Consumer-facing businesses in banking, telecoms and retail are leading adoption of analytics internally to support the business
Concerns about cloud governance and data sovereignty are stumbling blocks for many enterprises with an international customer base.
Whether it's done in specialized software or cobbled-together spreadsheets, financial modeling usually employs these basic techniques.
A vendor's Heartbleed scan shows that a majority of Global 2000 organizations may still be vulnerable despite patching the OpenSSL flaw.
A variant of malware on Android devices removes and reinstalls itself when a device powers on or off. Learn how to completely eradicate the threat.
Big data clusters require a different security model. Four common approaches can help security teams migrate beyond familiar RDBMS techniques, to the tools and processes required in new database environments.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process.
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.