Incident response management best practices, Enterprise risk management strategies, Information security policies & end-user awareness, Business compliance management, Information security certifications and training
Facebook’s acquisition of Bangalore-based Android app development company Little Eye Labs could spur the Indian startup sector
The final three months of 2013 saw sales of PCs slump by almost 20% compared to the same period last year
Planning a move to Exchange 2013 can be an overwhelming process, but preparation is the key to success. We can help.
Compared with on-premises models, hosted contact centers don't harm or enhance customer experience.
VMware CEO, Pat Gelsinger, has been in London to launch vCloud Hybrid Service in the UK, which will drive a shift away from on-premise VMs
Organizations in India will increase their spending of public cloud services by almost 30% in 2014 and is predicted to be worth $1.3bn by 2017
Big data applications add a variety of technology options to consider. And for many companies, one big data horse won't be enough to carry the load.
Moving big data can cause network strain, leading some businesses to turn to the enterprise data hub.
The Aadhar project has enrolled over fifty core persons to date but, but four years from the start of enrollment, progress is slowing down and diminishing public support
Microsoft moved to address a lingering Internet Explorer zero-day vulnerability that was originally discovered by security vendor FireEye in February.
Does DevOps sacrifice security to speed software deployments? Experts say DevOps and security can coexist with help from automated security tools.
API security is a growing enterprise concern. In the wake of recent high-profile breaches, discover how to alleviate the issues of insecure APIs.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
The latest variant of the banking Trojan is causing numerous problems, Symantec said.