Incident response management best practices, Enterprise risk management strategies, Information security policies & end-user awareness, Business compliance management, Information security certifications and training
A new report shows that hackers can get past even the most up-to-date security tools. Could CIO insecurity be partly to blame?
India’s IT sector has grown rapidly over the past decade as businesses in the US and UK have turned to the country to access lower-cost IT skills
Microsoft customers awaiting Windows 9 updates didn't hear details at WPC, where the company touted cross-platform support and mobile device plans.
Pharmaceutical company AstraZeneca has rolled out ServiceNow self service IT to 51,500 staff globally in four months.
Indian organizations' adoption of cloud computing is rising each year but the market's maturity is developing much more slowly
Amazon may be the king of the cloud world, but some customers find its data sovereignty assurances clear as mud.
Good CSRs offering good customer service used to be enough for a contact center. But, today, facilities need to dump legacy technology to stay ahead.
Consumer-facing businesses in banking, telecoms and retail are leading adoption of analytics internally to support the business
Concerns about cloud governance and data sovereignty are stumbling blocks for many enterprises with an international customer base.
Distributed denial-of-service attacks are increasingly a menace for enterprises. Expert Michael Cobb discusses industry initiatives that can help enterprises reduce the occurrence and power of DDoS attacks.
Can determined attackers be prevented from launching a distributed denial-of-service attack against an enterprise? In this Q&A, expert Michael Cobb discusses the reality of attack prevention and offers best practices for thwarting attacks.
News roundup: Endpoint antimalware has been long considered ineffective, yet a recent IDC report projects endpoint security growth. What gives? Plus: AWS Zocalo, new gTLDs, QR code authentication and more.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.