IBM is planning its first datacenter focused on providing cloud services to Indian organizations
Amazon Web Services (AWS) launched AWS Aurora – a MySQL-compatible database engine for its relational database service, billed by analysts as a “database game-changer” – at its re:Invent 2014 user conference.
Google has creates Hindi-language website to add 300 million Indian internet users by 2017
India is moving towards a digital future with dreams of smart cities, but Indian IT companies seem to be unconscious to the need for data security
Chinese mobile phone maker Xiaom is to set up a datacenter in India to allay fears over data security raised by the Indian Air Force (IAF).
Detecting fake websites needs to be part of all companies' security strategies, according to security and domain name experts.
Swiss bank UBS has hit major delays migrating to a cloud-based HR system and is yet to complete the move two and a half years after deciding to implement Oracle Fusion Human Capital Management (HCM).
PNB has outsourced its customer lifecycle management in a five-year deal worth more than INR 200 crore to improve customer relationships
Indian banking and securities firms will be spending about INR 470bn on IT products and services in 2014
Make way for DevSecOps. According to Gartner analyst David Cearley, CIOs need to add security professionals to their DevOps teams.
The number of mobile devices now outnumbers the number of people in the world. Mass mobilization calls for next-generation security tools and some forward thinking on the part of CIOs.
A new technology called runtime application self-protection is being touted as a next big thing in application security. But not everyone is singing its praises.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
In this tip, learn why best practices such as continuous monitoring and third-party vetting are vital to long-term mobile compliance and security.
New compliance requirements under PCI DSS version 3.0 strive to make cardholder data security part of companies' everyday business processes.
In this tip, learn how to prepare and implement a mobile data management policy that protects your organization against compliance violations.