Incident response management best practices, Enterprise risk management strategies, Information security policies & end-user awareness, Business compliance management, Information security certifications and training
( Aug 20, 2014 )
( Jul 30, 2014 )
( Jul 16, 2014 )
( Jun 17, 2014 )
( May 07, 2014 )
Premium wearable devices will push wearable revenues to $53.2bn by the year 2019, according to research firm Juniper.
The number of active wireless connected devices will exceed 40.9 billion by 2020 – more than double the current total, according to ABI Research. The explosion in connected devices will be driven by the internet of things (IoT).
A new report shows that hackers can get past even the most up-to-date security tools. Could CIO insecurity be partly to blame?
Cloud partners use a plethora of tools to help customers migrate to the cloud, but they find their automation efforts can bump into limitations.
Pharmaceutical company AstraZeneca has rolled out ServiceNow self service IT to 51,500 staff globally in four months.
Indian organizations' adoption of cloud computing is rising each year but the market's maturity is developing much more slowly
Using social media to gather data on customers has been rife with opportunities -- and risks -- for customer data privacy.
The concept of data privacy in the age of big data may seem somewhat antithetical to most commercial data-gathering operations, but organizations that don't respect their users' privacy may soon have big problems on their hands.
Good CSRs offering good customer service used to be enough for a contact center. But, today, facilities need to dump legacy technology to stay ahead.
Security controls integrated into the new Apple Pay mobile payment system could strengthen the payment security ecosystem, but unanswered questions remain, like the ramifications of a lost iPhone.
In his 'Security that Works' column, Eric Cole of the SANS Institute covers how often-underutilized NAC technology can be employed in a new way: as part of a continuous monitoring effort to support attack detection.
News roundup: City-sponsored situational awareness software use at a music festival illustrates the importance of enterprise surveillance strategy evaluation. Plus: Apache Tomcat upgrade; OpenSSL security policy; and call center security concerns.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.