Incident response management best practices, Enterprise risk management strategies, Information security policies & end-user awareness, Business compliance management, Information security certifications and training
Each industry vertical in India has its own set of BYOD related demons to contend with. For this feature, we spoke to industry leaders across several segments to get an idea of where India Inc. stands on the BYOD front.
What's your company doing about the Internet of Things? The Amazon CTO's list of IoT efforts in science, consumer products and sports should convince CIOs to get cracking: The Data Mill reports.
ITC Group might be over 100 years old but it is at the forefront of enterprise IT in India. CIO VVR Babu tells searchcio.in about his role at a company where he has worked for 35 years.
Wearable technology is creating new privacy headaches for employers, a leading law firm has warned.
Attempts by India’s global service providers to win business with large multinationals will benefit enterprises in the company
IT shops that want to use the cloud as the compute platform for some or all of their applications must first migrate those applications to the cloud, which is easier said than done.
Software piracy will remain prevalent even as more applications are delivered over the internet in a software-as-a-service subscription model, according to the BSA Global Software Survey.
Whether it's done in specialized software or cobbled-together spreadsheets, financial modeling usually employs these basic techniques.
Salesforce.com's upgrade of its Desk.com application includes a new agent console, a mobile app and new reporting capabilities.
At the very high end of social media monitoring tools, there are two suites so extensive and powerful that "suite" doesn't fully capture them: They are full-blown platforms, worlds unto themselves that offer staggering features and utility -- and price tags to match.
While BlackBerry's CEO touts the mobile platform's security features, experts question whether the advantage over iOS and Android still exists.
A recent proof of concept shines new light on the future of mobile keyloggers. Michael Cobb reviews how to keep touchscreen devices safe from attack.
Expert Kevin Beaver explains how enterprises can take a page from Facebook's ThreatData framework security analytics to boost enterprise defense.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.