Incident response management best practices, Enterprise risk management strategies, Information security policies & end-user awareness, Business compliance management, Information security certifications and training
Each industry vertical in India has its own set of BYOD related demons to contend with. For this feature, we spoke to industry leaders across several segments to get an idea of where India Inc. stands on the BYOD front.
A new report shows that hackers can get past even the most up-to-date security tools. Could CIO insecurity be partly to blame?
India’s IT sector has grown rapidly over the past decade as businesses in the US and UK have turned to the country to access lower-cost IT skills
Microsoft customers awaiting Windows 9 updates didn't hear details at WPC, where the company touted cross-platform support and mobile device plans.
Pharmaceutical company AstraZeneca has rolled out ServiceNow self service IT to 51,500 staff globally in four months.
Indian organizations' adoption of cloud computing is rising each year but the market's maturity is developing much more slowly
Amazon may be the king of the cloud world, but some customers find its data sovereignty assurances clear as mud.
Good CSRs offering good customer service used to be enough for a contact center. But, today, facilities need to dump legacy technology to stay ahead.
Consumer-facing businesses in banking, telecoms and retail are leading adoption of analytics internally to support the business
Concerns about cloud governance and data sovereignty are stumbling blocks for many enterprises with an international customer base.
An infosec consultancy has claimed that a Heartbleed exploit was used by attackers to gain access as part of the Community Health data breach.
This vulnerability scanning quiz will test you on the key points we've covered in the webcast, podcast and article in this Security School.
The Internet of Things is coming; is your security program in place? If not, it's time to start the planning process.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process.
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.