Co-ordinated effort needed to protect multi-enterprise applications from cybercrime and data loss, risking $US1 trillion.
Cutting IT costs without strategy could harm businesses, argues Peter Waterhouse, stressing EITM's role in wise cost management.
New PCI DSS standards are affecting millions of businesses and consumers worldwide in response to credit card theft.
The scam is somewhat more elaborate than many we see, and it's worth a little analysis to see what flags we can extract from it for spotting a phisher at work.
Mark Edmead stresses that effective security encompasses processes and people, not just tech, challenging outdated perimeter-focused strategies.
Web 2.0, mobile devices, and Gen Y's tech habits are reshaping business security landscapes, demanding new strategies for data protection.
Explore lucrative margins in tech: From MYOB software dominance to Kingston's reliability, there's gold in niche markets.
The recent hacking of the Domainz registry may have looked like a storm in a teacup, but the implications for the security of Web sites are much larger.
A strategic framework approach pays when it comes to compliance, providing consistency and control over information security.
The pressure is on to find more effective ways to keep on top of burgeoning regulatory, organisational and commercial compliance demands.
UTM redefines cyber security, merging tech to counter sophisticated threats, opening lucrative markets for savvy resellers.