Incident response management best practices, Enterprise risk management strategies, Information security policies & end-user awareness, Business compliance management, Information security certifications and training
( Oct 30, 2014 )
( Oct 15, 2014 )
( Sep 25, 2014 )
( Sep 15, 2014 )
( Sep 05, 2014 )
While consumers in the US and China show some interest in paying for goods using smartwatches, Brits are less interested, according to global research.
The Indian government will spend $7.2bn on IT in 2015, with IT and BPO services the biggest area of investment, says Gartner
Indian private bank Yes Bank is using software from SunTec for revenue management and business assurance
As we reach the final quarter of 2014, the industry is eagerly waiting for major announcements from the cloud biggies.
Microsoft Azure cloud CTO Mark Russinovich identified ten key security risks of public cloud services.
Microsoft is planning to offer cloud services – Azure and Office 365 – in India from local datacenters by the end of 2015
Many companies don't apply data analytics tools to IT security processes. But commentators at a SAS conference said doing so could help them identify and stop security threats.
Spending on enterprise applications in 2014 will grow faster than any other segment of the software market in India
SAP has extended its long-standing partnership with IBM by making IBM's open cloud platform the infrastructure to run SAP Hana Enterprise Cloud.
Multifactor authentication technology can be complicated. Expert David Strom explains what enterprises need to know before they invest in an MFA product.
CurrentC, the retailer-backed mobile-payment platform, admitted to the breach shortly after the Apple Pay competitor was blamed for shutting down other NFC-based payment options.
Customers and partners like the new effort by the Intel-owned security vendor to integrate threat intelligence feeds with all of its existing products, but analysts are leery of lacking threat intelligence standards.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.