Incident response management best practices, Enterprise risk management strategies, Information security policies & end-user awareness, Business compliance management, Information security certifications and training
( Aug 20, 2014 )
( Jul 30, 2014 )
( Jul 16, 2014 )
( Jun 17, 2014 )
( May 07, 2014 )
The opening of an IT service centre in Chennai last week will kick off AstraZeneca’s bold insourcing strategy, announced earlier this year, and focus on a trend that is seeing large businesses invest in global delivery operations.
Premium wearable devices will push wearable revenues to $53.2bn by the year 2019, according to research firm Juniper.
The number of active wireless connected devices will exceed 40.9 billion by 2020 – more than double the current total, according to ABI Research. The explosion in connected devices will be driven by the internet of things (IoT).
IT infrastructure and operations (I&O) skills including capacity planning and performance management, which are widely valued in datacentres, are no longer sufficient to meet business needs in the digital economy era, analyst firm Gartner has warned.
Cloud partners use a plethora of tools to help customers migrate to the cloud, but they find their automation efforts can bump into limitations.
Pharmaceutical company AstraZeneca has rolled out ServiceNow self service IT to 51,500 staff globally in four months.
Oracle has made Oracle OpenStack for Oracle Linux distribution generally available so customers can use it with the company's own version of Linux and virtual machine (VM) services.
Using social media to gather data on customers has been rife with opportunities -- and risks -- for customer data privacy.
The concept of data privacy in the age of big data may seem somewhat antithetical to most commercial data-gathering operations, but organizations that don't respect their users' privacy may soon have big problems on their hands.
Zeus malware is back with a new target -- mobile devices. Expert Nick Lewis explains how Zeus-in-the-mobile differs from traditional Zeus and how to defend against it.
Video: Keith Barker of CBT Nuggets shows how to use VMware ESXi hosts to perform sandbox testing on virtual machines.
Vendors are hurriedly implementing a new patch released over the weekend for the 'Shellshock' Bash vulnerability, but researchers have since found more Bash flaws that will likely need prompt remediation.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.