Incident response management best practices, Enterprise risk management strategies, Information security policies & end-user awareness, Business compliance management, Information security certifications and training
Premium wearable devices will push wearable revenues to $53.2bn by the year 2019, according to research firm Juniper.
The number of active wireless connected devices will exceed 40.9 billion by 2020 – more than double the current total, according to ABI Research. The explosion in connected devices will be driven by the internet of things (IoT).
A new report shows that hackers can get past even the most up-to-date security tools. Could CIO insecurity be partly to blame?
Cloud partners use a plethora of tools to help customers migrate to the cloud, but they find their automation efforts can bump into limitations.
Pharmaceutical company AstraZeneca has rolled out ServiceNow self service IT to 51,500 staff globally in four months.
Indian organizations' adoption of cloud computing is rising each year but the market's maturity is developing much more slowly
Using social media to gather data on customers has been rife with opportunities -- and risks -- for customer data privacy.
The concept of data privacy in the age of big data may seem somewhat antithetical to most commercial data-gathering operations, but organizations that don't respect their users' privacy may soon have big problems on their hands.
Good CSRs offering good customer service used to be enough for a contact center. But, today, facilities need to dump legacy technology to stay ahead.
In the wake of the iCloud celebrity photo hack, expert Keith Palmgren offers advice on how to build more effective passwords and avoid easy data breaches.
Starting the insider threat detection process when hiring new staff members can put your company ahead of the curve. Expert Joe Granneman explains what to look for to prevent insider threats.
The defense-in-depth security model is often touted as a must for enterprises, but research shows that security products often fail to do what they're supposed to.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.