Incident response management best practices, Enterprise risk management strategies, Information security policies & end-user awareness, Business compliance management, Information security certifications and training
Microsoft customers awaiting Windows 9 updates didn't hear details at WPC, where the company touted cross-platform support and mobile device plans.
What's your company doing about the Internet of Things? The Amazon CTO's list of IoT efforts in science, consumer products and sports should convince CIOs to get cracking: The Data Mill reports.
ITC Group might be over 100 years old but it is at the forefront of enterprise IT in India. CIO VVR Babu tells searchcio.in about his role at a company where he has worked for 35 years.
Amazon may be the king of the cloud world, but some customers find its data sovereignty assurances clear as mud.
Attempts by India’s global service providers to win business with large multinationals will benefit enterprises in the company
IT shops that want to use the cloud as the compute platform for some or all of their applications must first migrate those applications to the cloud, which is easier said than done.
Concerns about cloud governance and data sovereignty are stumbling blocks for many enterprises with an international customer base.
Whether it's done in specialized software or cobbled-together spreadsheets, financial modeling usually employs these basic techniques.
Salesforce.com's upgrade of its Desk.com application includes a new agent console, a mobile app and new reporting capabilities.
Expert Nick Lewis explains how to keep call center employees from getting duped by social engineering scams and pretexting.
News roundup: The revelation of potential iOS backdoors -- and Apple's perceived acknowledgement of them -- has sparked debate over the definition of a backdoor and raised concerns over iOS security.
Learn about the tools and services available that enterprises can use to determine the security of their third-party applications.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.