Confound thieves by locking the phone tight, pinpointing it on a map, or wiping its data.
It will be the command centre for countering cyber threats and ensure compliance of the bank's security policy.
Security products are expanding rapidly into small, fast-growing geographies where demand is greater than ever, says IDC.
Ensuring a secured state while providing flexible work options to mobile employees and partners is paramount in the BFSI industry, says Sandeep Phanasgaonkar, President and CTO, Reliance Capital.
Recent high-profile data lapses have highlighted the difficulties for web giants and regulators alike of protecting consumer data.
Ashish Pachory, CIO - Tata Teleservices elaborates on the rationale and the functioning of its Security Operation Centre.
Lack of resources, budgets and general awareness holding down the adoption of disaster preparedness in Indian SMEs, says Symantec.
Symantec survey reveals that digital information makes up 49 percent of an organisation's total value.
Symantec survey reveals that SME employees are increasingly adopting unmanaged, personal-use online file sharing solutions without permission from IT.
Automated hacking of online bank accounts might have stolen $78 million in the past year from customers in Europe, Latin America and the United States.
Satish Das, CSO, Cognizant, reveals how, in the times of cloud and social media, it is more important to manage risk than ever before.
Trend Micro Deep Security and OfficeScan Intrusion Defense Firewall provide the vulnerability shielding required to protect Windows environments from zero-day threats.
Flame allows operators to delete files from computers, which means it can cause critical programs to fail or completely disable operating systems.
Websense Security Labs shares some of the cyber-scams associated with the 2012 Summer Olympic Games in London.
Defenx is the maker of popular anti-virus, Internet security and smartphone security solutions.
Successful attacks cost businesses over $100,000 per incident, says Check Point survey.
MetricStream's integrated GRC solution will be used across nearly 80 countries to consolidate and streamline Procter & Gamble's GRC initiatives.
Researchers say some variants of malicious software can now transfer money out automatically, without a hackers supervision.
CISM and CRISC named two of the highest-paying IT certifications in Foote Partners' IT Skills and Certifications Pay Index.
Frustrated by their inability to stop sophisticated hacking attacks or use the law to punish their assailants, an increasing number of U.S. companies are taking retaliatory action.
Collaboration to extend ARM TrustZone security technology into x86-based AMD offerings.
Vendor-neutral technology and services required to assess, remediate, maintain and manage plant automation network performance, vulnerabilities and cyber security measures.
Vendors in the Magic Quadrant are evaluated based on their completeness of vision and ability to execute.
Bitdefender, global antivirus company has released a tool to find and remove the complex, dangerous spy tool Flamer attack toolkit.
The McAfee Cloud Security Platform helps businesses build a secure bridge to the Cloud.
Rapid proliferation of consumer mobile devices is high priority shows Gartner's survey, making BYOD a major security concern.
Unified threat management (UTM) integrates multiple security tools into a single network appliance, enabling businesses to deploy enterprise-grade security without the complexity and costs associated with multiple point products.
First Advantage will collaborate with Pitney Bowes to secure employment documents at the point of origin.
The ISG Cloud Security Assessment will be based on standards and guidelines defined by the Cloud Security Alliance.
Security experts say the company's data security practices were not as sophisticated as one would typically expect from a major Internet company.