Pharmaceutical company AstraZeneca has rolled out ServiceNow self service IT to 51,500 staff globally in four months.
Indian organizations' adoption of cloud computing is rising each year but the market's maturity is developing much more slowly
Amazon may be the king of the cloud world, but some customers find its data sovereignty assurances clear as mud.
At Black Hat, David Litchfield skewered Oracle and its approach to security while detailing several flaws in a new Oracle database security feature.
Arguably the most important task of any endpoint security system is to protect against malware. However, these products are less effective as attackers develop increasingly novel ways of sidelining device security.
Indian organizations are waking up to the risks that weak security causes as business becomes digitized
Good CSRs offering good customer service used to be enough for a contact center. But, today, facilities need to dump legacy technology to stay ahead.
Consumer-facing businesses in banking, telecoms and retail are leading adoption of analytics internally to support the business
Concerns about cloud governance and data sovereignty are stumbling blocks for many enterprises with an international customer base.
In this Ask the Expert from the Catalyst conference in San Diego, Gartner Analyst Mario de Boer talks about secure enterprise mobile collaboration, including why MDM and AV aren't effective security measures.
To take on the Internet of Things, CIOs will need an IT architecture with built-in digital intelligence to keep up with changing market forces and create competitive advantage. The Data Mill reports.
Crafting a specific, clearly defined cloud contract with your provider is crucial to staving off security problems and SLA breaches. In this tweet jam recap, participants shared tips on how to best communicate needs to cloud providers.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
In this tip, learn five strategies to ensure cloud-based information governance processes meet organizations' unique e-discovery management needs.
Corporate compliance and risk management expert Jeff Jenkins outlines three invaluable -- but often overlooked -- strategies that companies should incorporate during cybersecurity program development.
Join SearchCompliance Thursday, Aug. 21, to discuss how big data has complicated e-discovery management and best practices to avoid legal complications around digital information governance.