McAfee Enterprise Security Manager provides intelligence and takes SIEM to a real-time understanding of the global threat landscape.
HP Research identifies new era of security risk, shifting vulnerability landscape.
Context Information Security identifies significant flaws in the implementation of cloud infrastructure services offered by some providers.
APAC had the strongest growth of any region in 2011, growing 31.8 percent in 2011.
Websense Security Labs outlines top recommendations and insights for protecting from and containing sophisticated malware and targeted attacks.
Cos should consider the value of ethical hacking services, which are rapidly gaining attention as an essential security practice that should be performed on a regular basis.
New technologies incite new attacks that challenge business enterprises, notes Frost & Sullivan
Malicious attacks are the costliest type of data breach in India, says Symantec.
Trend Micro issues new security roundup report for Q1 2012.
Enterprises do not have a clear and comparable choice of endpoint protection solutions that completely meet today's mobile working security requirements, says Ovum.
Empanelment empowers Netmagic to carry out IT security audits, including vulnerability assessment and penetration testing.
Managing risk for an enterprise has become an important business driver and an act of survival.
The next generation of data protection and recovery software functionality continues to evolve.
ISACA releases COBIT 5, the business framework for the governance and management of enterprise IT.
Wolters Kluwer Financial Services helps banks meet regulatory reporting and compliance requirements in India.
Solution streamlines the process of visitor management and enables organisations to control access to their facilities.
According to Gartner, the Leaders quadrant contains vendors at the forefront of making and selling UTM products that are built for midsize business requirements.
McAfee's AV solution provides comprehensive defences against physical and virtual attacks.
Tips to avoid having sensitive data stolen or devices infected while travelling.
Together with DIALOGS, Sophos strengthens its mobile footprint, providing complete security for mobile workforces.
New script downloads an applet, that downloads a downloader Trojan, that downloads a banker Trojan, that downloads... pure malice.
Solution protects security algorithms from attacks in "white box" environments.
Payment network operators MasterCard, Visa, American Express and Discover Financial Services confirmed they were affected.
The demand to use smart devices in and for the enterprise is rapidly rising. However, IT leaders are still hesitant to cave in with the high risks posed by BYOD phenomenon.
Information Security Forum provides organisations with insights into managing risks as security threats collide.
Michele Orru', Penetration Testing Specialist, Royal Bank of Scotland Group, in conversation with Revathi Raghavan, suggests developers should be taught the importance of secure code.
How do you ensure the same rigour for security compliance when you have so many stakeholders that may not directly, or even indirectly, be in your sphere of influence?
RSA has ranked India in the top five most targeted countries for phishing attacks.
Companies to jointly sell high-speed, low-latency Ethernet link encryption solutions specifically designed to work at Layer 2.
The demand for more sophisticated protection makes niche network security firms prime takeover targets.