@cybersecurity
3 Risk Principles To Build Trust In Digital Era
by CXOtoday News Desk    Sep 29, 2015
Category : Press Releases
As digital business creates new types and levels of risk, businesses must invest in three risk disciplines to increase trust.
ISACA Selects India's RV Raghu As Global Director
by CXOtoday News Desk    Jun 09, 2015
Category : News & Analysis
Raghu is the cofounder and director of Versatilist Consulting India which provides consulting, training and auditing services to IT firms
Protecting Businesses from Complex Cyber Attacks
Category : Columns
In cyber security, one has to look beyond technology for a solution.
More CIOs To Get SMAC-Ready In 2015: EY-CIOKLUB
by CXOtoday News Desk    Apr 27, 2015
Category : Events
CIOs are looking to invest in SMAC to achieve business objectives, says the report; BSE-CIOKlub names Best CIOs in 11 verticals
Rising Security Attacks: A Wake-Up Call For CISOs
by CXOtoday News Desk    Feb 16, 2015
Category : News & Analysis
Ernst and Young’s Global Information Security survey of 2014 states that over 56% of organizations are unlikely to detect sophisticated cyber attacks
Top Cyber Security Predictions For 2015
by CXOtoday News Desk    Dec 22, 2014
Category : News & Analysis
Jagdish Mahapatra, MD, McAfee India and SAARC, outlines some of the top cyber security trends For 2015
Govt Spending To Boost India's Biometrics Market
by CXOtoday News Desk    Nov 28, 2014
Category : News & Analysis
Fingerprint biometrics accounts for majority of market share in the overall biometrics technologies market.
Top 10 IT Security Predictions For 2015
by CXOtoday News Desk    Nov 28, 2014
Category : Research
Symantec’s security predictions for 2015 takes a look at issues that will affect individual consumers, businesses and governments.
IoT Most Prone To Cyber Attacks
by CXOtoday News Desk    Nov 20, 2014
Category : News & Analysis
Technology : Virtualization
Websense's top 7 cyber security predictions for 2015 say businesses, more than customers, will be the targets of attacks
Phishing Still An Effective Hacking Method: Study
by CXOtoday News Desk    Nov 11, 2014
Category : News & Analysis
Researchers say 20 pc of hackers access compromised accounts within 30 minutes of getting their credentials
PAGE: 123456789