More than half of UK firms expect a cyber attack in the next six months, but see competitors as a greater risk than criminals
John Lewis is using augmented reality to enable customers to try clothes on virtually, as part of its multichannel offering.
ISACA’s update to its popular COBIT 5 framework incorporates a business-wide approach the organization says helps enterprises maximize their information and technology assets.
Context Information Security found that data stored by a cloud customer could be accessed by the next customer to spin up a VM on the same disk.
Small and medium enterprises (SMEs) typically face the same threats as bigger organisations, but lack the same level of expertise and other security resources.
Apple has posted another remarkable set of financial results, overtaking IT giants IBM and HP in sales during its latest financial quarter.
SAP has continued where it left off last year with an 11% increase in sales in the first three months of 2012.
Explore India Inc’s top five IT spending priorities of 2012-13. Also view the slideshow of key data points of this Ernst & Young-CIO Klub survey.
Keeping software up to date with security patches can deliver 80% protection from cyber threats, says security firm Secunia.
The Trustworthy Internet Movement (TIM) is to tackle implementation and governance internet communication protocol (SSL) as its first project.
Unscrubbed hard drives on computers that are decommissioned and sold on represent a significant risk to business
Amazon's AWS cloud business made $500m in sales in the first quarter of 2012, comprising 3.79% of Amazon's Q1 business
The Serious Organised Crime Agency shut down 36 CVV sellers who were selling stolen credit card and banking credentials to buyers around the world.