Incident response management best practices, Enterprise risk management strategies, Information security policies & end-user awareness, Business compliance management, Information security certifications and training
( Nov 13, 2014 )
( Oct 30, 2014 )
( Oct 03, 2014 )
( Aug 20, 2014 )
( Jul 30, 2014 )
The flag carrier airlines of India owned by Air India, a Government of India enterprise, faced a major technical glitch in their check-in system
Indian IT spending is forecast to reach $73.3bn in 2015, up by 9.4% from $67.1bn in 2014
Business-to-business (B2B) suppliers are investing in technology to address changing buying habits in the consumer retail sector, as online business purchases surge.
IBM is planning its first datacenter focused on providing cloud services to Indian organizations
Amazon Web Services (AWS) launched AWS Aurora – a MySQL-compatible database engine for its relational database service, billed by analysts as a “database game-changer” – at its re:Invent 2014 user conference.
Google has creates Hindi-language website to add 300 million Indian internet users by 2017
Swiss bank UBS has hit major delays migrating to a cloud-based HR system and is yet to complete the move two and a half years after deciding to implement Oracle Fusion Human Capital Management (HCM).
PNB has outsourced its customer lifecycle management in a five-year deal worth more than INR 200 crore to improve customer relationships
Indian banking and securities firms will be spending about INR 470bn on IT products and services in 2014
Major IT companies like Black Hat and Google spoke out against the proposed Wassenaar Arrangement rules for cybersecurity software, and those protests have caused the U.S. Dept. of Commerce to commit to drafting new rules.
News roundup: New threats add to the Tor anonymity debate as a new browser aims to take anonymous browsing to the next level. Plus: Android security outlook bad -- or is it?; another Xen host escape flaw; Wassenaar revisions put on hold.
The recently shutdown Darkode cybercriminal community has been rebuilt, and claims the administrators are intact and security will be tightened to better avoid law enforcement.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process.
Drive-by financial malware Fobber is the evolution of the popular Tinba -- with better encryption, a newer format and a focus on the Netherlands.
Heimdal Security researchers have found new cases of the nesting-doll financial malware, while Fortinet researchers peel back the layers to reveal its surprising intricacies.
A new Symantec report shows a significant fall in banking malware infections in 2014, but the company warns that malware remains a threat to financial firms.