As we reach the final quarter of 2014, the industry is eagerly waiting for major announcements from the cloud biggies.
Microsoft Azure cloud CTO Mark Russinovich identified ten key security risks of public cloud services.
Microsoft is planning to offer cloud services – Azure and Office 365 – in India from local datacenters by the end of 2015
WordPress is the most attacked web application and websites that run the content management system (CMS) are attacked 24% more often than those using alternative systems.
The Bank of Maharashtra (BOM) is using software from FIS for a card management and card fraud and risk monitoring system as it modernizes its payments platform
Cyber security suffers from a lack of execution, former White House cyber security co-ordinator Howard Schmidt has said.
Many companies don't apply data analytics tools to IT security processes. But commentators at a SAS conference said doing so could help them identify and stop security threats.
Spending on enterprise applications in 2014 will grow faster than any other segment of the software market in India
SAP has extended its long-standing partnership with IBM by making IBM's open cloud platform the infrastructure to run SAP Hana Enterprise Cloud.
Today's sophisticated attacks can only be foiled when humans are in the loop. In part two of Future State, security expert Bruce Schneier gives advice on how to augment IR teams and processes for the future.
More organizations are realizing that strong incident response is the best way to prevent future attacks, but IR is still underfunded. In this installment of Future State, security expert Bruce Schneier lays out the state of IR today.
Russian-backed hackers could be at it again, this time targeting the White House. Experts advise businesses take a page from the hackers and get organized. Also in Searchlight: Apple CEO Tim Cook proudly comes out; Wal-Mart faces off with Apple Pay.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
Before developing a cloud service agreement, companies must first determine their unique data management and e-discovery-specific requirements.
In the wake of several high-profile data breaches, #GRCchat participants discuss whether meeting PCI DSS standards is an effective step toward better customer data protection.
There are many questions to consider when moving data management to the cloud, including the cost implications of cloud-based e-discovery services.