@IT security
The Business of Apps, Security, and Consumer Expectations
Category : Columns
It is important for businesses to consider the insights into consumer trade-offs for convenience vs. security, to secure their digital business and take it forward.
Phishing Attacks: How To Avoid Getting Hooked
Category : Columns
Education is the first defense, and the ability to differentiate between legitimate and fraudulent emails is vital.
Scalability Is The Primary Focus for CIOs: Interview
by Swaminathan B    Apr 24, 2017
Category : News & Analysis
Shibu Paul, Regional Sales Director - APAC at Array Networks explains how Array Networks is helping CIOs attain growth and scalability with its solutions.
CIOs Coming To Terms With Fear Of Cloud Security
by Anshuman Singh    Apr 20, 2017
Category : Blog
IT security is always listed as the number one barrier to adoption when it comes to cloud computing. But despite those concerns adoption of cloud security services continues to grow at unprecedented rates.
10 Ways Cos Can Minimize Risk Of Ransomware
Category : Columns
Here are our top 10 tips to reduce the risks of ransomware, phishing, and APT attacks.
Security Analytics Proves Challenging But Effective: Study
by CXOtoday News Desk    Mar 07, 2017
Category : Research
Organizational success requires a confluence of different analytic disciplines and also a carefully plotted road map for maturing analytic capabilities, it says.
IT Security Critical for Digital Transformation: Study
by CXOtoday News Desk    Nov 24, 2016
Category : Press Releases
Security helps build trusted digital relationships that are critical in growing the business today, finds a CA Technologies study.
Top IT Security Challenges For NextGen Banking
Category : Columns
As next generation technologies like mobility, social media and big data transform banking services, it is important to guard against the new emerging security threats.
Top Trends To Watch Out In The Server Space
by CXOtoday News Desk    Dec 21, 2015
Category : Blog
Security remains the number one concern followed by hyper-convergence and pressure on CIOs to do more with less, says Siddhesh Naik of Lenovo.
Five Best Practices In Access Control
Category : Columns
Once a yearly review process is in place, the fundamental best practices concept is that an effective security system uses a layered approach to security.
PAGE: 12345678