Incident response management best practices, Enterprise risk management strategies, Information security policies & end-user awareness, Business compliance management, Information security certifications and training
Each industry vertical in India has its own set of BYOD related demons to contend with. For this feature, we spoke to industry leaders across several segments to get an idea of where India Inc. stands on the BYOD front.
As healthcare IT spending in India is set to increase 7% next year CIOs must focus on the front end to ensure they get value from back-end modernization and meet the government’s goals to improve accessibility to health services
Gartner predicts Indian banks will increase IT spending next year by almost 10% as the Indian government awards more banking licenses
With innovative technology increasingly developed outside the IT department, CIOs need to start working with other departments
54.8% of Indian CIOs will increase their cloud computing budgets in 2014, with software as a service (SaaS) the most common
IT priorities and budgets have shifted toward software, cloud and automation to get the most from data centers in 2014.
Nine out of ten organisations redeploy freed-up resources on new projects and services, says CIF survey
Big data has a range of practical and commercial benefits to businesses but can be fraught with privacy and legal issues
Candidates need unique mix of skills for data scientist roles, according to AWS’s director of data science
Inside, learn what the top big data essentials are and why you should be asking "Chewy" Qs.
Use of microVMs for malware detection and isolation is growing, but expert Brad Casey cautions that the tactic isn't a cure-all for fighting malware.
Expert Nick Lewis explains how attackers are taking advantage of proxy auto-config capabilities in browsers and what mitigations can be put in place.
A new website built by Troy Hunt enables possible data breach victims to discover compromised accounts from several high-profile breaches.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
The latest variant of the banking Trojan is causing numerous problems, Symantec said.