Certification's growth reflects demand for experienced IT governance professionals.
Planning for a bike expedition or risk management is very similar; SOPs are similar in nature in case of a bike breakdown and a security breach. Burgess Cooper, CTSO, Vodafone, explains how.
The Complete Security Suites combines key functions like endpoint, data and web and email protection, along with mobile device management and protection for Microsoft Exchange and SharePoint.
Embracing new technologies not only provides a competitive edge, but also improves ability to recover from a disaster while protecting the information that their businesses depend on.
Aligning security to business objectives results in a flexible and sustainable security framework that will be able to incorporate dynamic business, requirements explains Sameer Ratolikar, CISO, Bank Of India.
Study by Juniper finds 400% increase in Android malware found since 2010.
Security suites for SMEs safeguard a business' desktops, file servers, and email servers with the convenience and ease of maintenance of a single, integrated SaaS solution.
What does it take to weave information security into the fabric of the organisational ethos, as a means to attain sustainable long term business value?
Solutions to help organisations better meet the challenges of the BYOD trend.
System allows proactive prevention of any fraudulent online transactions by studying and analysing customer transaction behaviour.
NetBackup 5200 and Backup Exec 3600 appliances protect information completely across virtual and physical systems.
The new solution allows small business owners to use HDTV network cameras to help them clearly identify intruders and other incidents from anywhere.
McAfee introduces Next Generation Network IPS for datacentres with scalable 80 gbps solution.
K9 Web Protection browser provides real-time protection against inappropriate material, malicious threats and phishing.
Solution secures mobile collaboration and BYOD for enterprises.
IDAS uses a pattern and a translucent card to derive one-time-passwords, that are dynamic in nature.
The SAS Fraud Framework employs business rules, anomaly detection, predictive modeling and social network analysis to detect possible fraud and immediately alert investigators or auditors.
The Report highlights cyber security issues at the national and global level; need for cooperation, and for information age response to the cyber challenge.
According to Gartner, the overall unified threat management market grew from an estimated $972 million in 2010 to $1.16 billion in 2011.
Facebook now offers safer social networking backed by the Trend Micro Smart Protection Network.
Nishchal Bhalla, Founder, SecurityByte talks to Biztech2.com about importance of cyber crime reporting, and the vulnerability of operating systems to cyber threats.
NetIQ Access Governance Suite 6 delivers actionable intelligence to help protect corporate data, meet compressed audit cycles.
The report highlights the spread of advanced targeted attacks to organisations of all sizes and variety of personnel, increase in data breaches, and focus on mobile threats by the attackers.
Sometimes, going off the beaten track for InfoSec measures can be more useful than the traditional tricks and leave a more profound impact on the employees' mind.
SME demand, advanced persistent threats and compliance were among the main drivers.
Microsoft study analyses data from more than 600 million systems worldwide, offers solutions for mitigating both targeted and broad-based attacks.
Innovations focus on risks posed by BYOD, cloud deployment and Big Data challenges.
The FortiDDoS appliances will support network virtualisation and automatic and continuous traffic baselining.
New analytics using advanced security intelligence can flag suspicious behaviour in network activities.
Free service eliminates the hassle of remembering passwords while keeping PCs, Macs, iOS and Android devices safe.