Incident response management best practices, Enterprise risk management strategies, Information security policies & end-user awareness, Business compliance management, Information security certifications and training
Each industry vertical in India has its own set of BYOD related demons to contend with. For this feature, we spoke to industry leaders across several segments to get an idea of where India Inc. stands on the BYOD front.
For April's #CIOChat, join @SearchCIO to discuss why adopting a predictive and/or prescriptive model might ease your enterprise's analytics woes.
Indian telecom operator Bharti Airtel has restructured its IT services contract with IBM following changes to its business
The countdown has begun. Microsoft XP will no longer be supported by Microsoft after 8 April
Cloud computing and the consumerization of enterprise IT has taken the app-store procurement model beyond its consumer focused origins
Stanford engineers and Facebook are both hoping to influence others into thinking about their data center power use, even in the cloud.
Every administrator has a question about their data center or IT roadmap that they're afraid to ask. On April 1, we answer three such questions.
Tata Consultancy Services and Twitter create app to help people observe, analyse and get involved in the Indian general election
More affordable and easier-to-use software is enabling companies in various industries to embrace the power of business intelligence and analytics.
Health system UPMC and financial services firm CIBC are taking big data projects from pilot mode to production in stages, buying tools as they go.
In the wake of the Heartbleed OpenSSL vulnerability, the massive deluge of revoked certificates could cause palpitations across the Internet.
Can Project Sonar, an Internet-scanning project, benefit enterprise network security? Expert Brad Casey discusses.
Sophisticated malware was behind the Michaels breach that resulted in three million compromised payment cards, according to the crafts retailer.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
The latest variant of the banking Trojan is causing numerous problems, Symantec said.