@IT security
Why CIOs Still ‘Fear’ Cloud And Big Data
by CXOtoday News Desk    Apr 06, 2015
Category : News & Analysis
Technology : Cloud Computing
A large number of firms have experienced a data breach or failed a compliance audit in the last year.
App Economy Demands A New Security Approach
by CXOtoday News Desk    Feb 06, 2015
Category : News & Analysis
The new app economy demands an increase in IT security investment, says a new CA Technologies research.
Tech M&As: Some Sectors Are Hot, Some Are Not
by CXOtoday News Desk    Jan 30, 2015
Category : News & Analysis
Analysts believe 2015 will likely be another strong year for deals because of the prospects for innovation.
Why Businesses Still Don’t Trust BYOD?
by Sohini Bagchi    Jan 23, 2015
Category : News & Analysis
Reports reveal many organizations are still mistrustful of BYOD, mainly because of security and privacy issues.
Six Datacenter Trends To Dominate In 2015
by CXOtoday News Desk    Jan 22, 2015
Category : News & Analysis
These six data center trends will move from leading edge to mass adoption in 2015, says a new study.
IT Pros, ‘Tis The Season To Get Sleepless Nights!
by CXOtoday News Desk    Dec 26, 2014
Category : Research
A new survey conducted by Ipswitch found that nearly half of IT professionals will be on call this holiday season.
SECaaS Will Gain Momentum In 2015
by CXOtoday News Desk    Dec 17, 2014
Category : News & Analysis
The shift to a security-as-a-service has been driven by a number of factors including a shortage of qualified IT security staff
Why The Future Of Security Is Context-Based
by Sonit Jain, CEO, GajShield    Dec 15, 2014
Category : Columns
Sonit Jain, CEO at GajShield describes some of the key benefits that enterprises can get by implementing context-based security.
Security Trends 2015: CISO Needs To Think Differently
by CXOtoday News Desk    Dec 12, 2014
Category : News & Analysis
Security tops CISOs' concerns, followed by regulations
Securing Enterprise Cloud Applications
Category : Columns
In recent times, it has become more critical than ever to hone in on the linchpin challenge of secure identity management.
PAGE: 12345678