Incident response management best practices, Enterprise risk management strategies, Information security policies & end-user awareness, Business compliance management, Information security certifications and training
While consumers in the US and China show some interest in paying for goods using smartwatches, Brits are less interested, according to global research.
The Indian government will spend $7.2bn on IT in 2015, with IT and BPO services the biggest area of investment, says Gartner
Indian private bank Yes Bank is using software from SunTec for revenue management and business assurance
As we reach the final quarter of 2014, the industry is eagerly waiting for major announcements from the cloud biggies.
Microsoft Azure cloud CTO Mark Russinovich identified ten key security risks of public cloud services.
Microsoft is planning to offer cloud services – Azure and Office 365 – in India from local datacenters by the end of 2015
Many companies don't apply data analytics tools to IT security processes. But commentators at a SAS conference said doing so could help them identify and stop security threats.
Spending on enterprise applications in 2014 will grow faster than any other segment of the software market in India
SAP has extended its long-standing partnership with IBM by making IBM's open cloud platform the infrastructure to run SAP Hana Enterprise Cloud.
The outdated encryption protocol was spotlighted earlier this month when Google researchers released details on the POODLE attack, which preyed on systems that support the SSL 3.0 fallback mechanism.
News roundup: Verizon gave its mobile users an early Halloween trick: a cookie that cannot be erased, despite a number of privacy concerns. Also: compromising an air-gapped computer over the air; an alleged government-funded hack against a CBS reporter and more.
Multifactor authentication technology can be complicated. Expert David Strom explains what enterprises need to know before they invest in an MFA product.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process.
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.