Incident response management best practices, Enterprise risk management strategies, Information security policies & end-user awareness, Business compliance management, Information security certifications and training
( Apr 07, 2014 )
( Mar 05, 2014 )
( Feb 26, 2014 )
( Jan 20, 2014 )
Two-thirds of UK IT budgets will be allocated to innovative new products and services by 2017
For April's #CIOChat, join @SearchCIO to discuss why adopting a predictive and/or prescriptive model might ease your enterprise's analytics woes.
Indian telecom operator Bharti Airtel has restructured its IT services contract with IBM following changes to its business
Cloud computing and the consumerization of enterprise IT has taken the app-store procurement model beyond its consumer focused origins
Stanford engineers and Facebook are both hoping to influence others into thinking about their data center power use, even in the cloud.
Every administrator has a question about their data center or IT roadmap that they're afraid to ask. On April 1, we answer three such questions.
Tata Consultancy Services and Twitter create app to help people observe, analyse and get involved in the Indian general election
The demise of the data scientist; traditional data warehousing makes a comeback; and the self-quantified self: The Data Mill reports.
More affordable and easier-to-use software is enabling companies in various industries to embrace the power of business intelligence and analytics.
Cloud-based storage introduces a number of risks, but banning these services outright is unlikely to generate the desired results.
The 2014 Verizon data breach report shows a big rise in Web application attacks, with CMS frameworks and user credentials the most likely targets.
When it comes to security, network segmentation can be a blessing or a curse. In this tip, we look at the pros and cons of this enterprise decision.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
The latest variant of the banking Trojan is causing numerous problems, Symantec said.