Incident response management best practices, Enterprise risk management strategies, Information security policies & end-user awareness, Business compliance management, Information security certifications and training
For April's #CIOChat, join @SearchCIO to discuss why adopting a predictive and/or prescriptive model might ease your enterprise's analytics woes.
Indian telecom operator Bharti Airtel has restructured its IT services contract with IBM following changes to its business
The countdown has begun. Microsoft XP will no longer be supported by Microsoft after 8 April
Cloud computing and the consumerization of enterprise IT has taken the app-store procurement model beyond its consumer focused origins
Stanford engineers and Facebook are both hoping to influence others into thinking about their data center power use, even in the cloud.
Every administrator has a question about their data center or IT roadmap that they're afraid to ask. On April 1, we answer three such questions.
Tata Consultancy Services and Twitter create app to help people observe, analyse and get involved in the Indian general election
More affordable and easier-to-use software is enabling companies in various industries to embrace the power of business intelligence and analytics.
Health system UPMC and financial services firm CIBC are taking big data projects from pilot mode to production in stages, buying tools as they go.
Proving the Heartbleed OpenSSL vulnerability can be exploited in the wild, two organizations say attackers have used it to glean sensitive data.
Large file transfers don't have to be scary. Learn four key steps to keeping your network secure when big files exit your enterprise.
If Wi-Fi network passwords are accessed off Android mobile devices by third parties, it could mean disaster without the right precautions.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
The latest variant of the banking Trojan is causing numerous problems, Symantec said.