Government could outsource IT to India, says Ovum
The government should consider offshoring IT work to India to achieve spending cuts, according to analyst firm Ovum.
More results...
The government should consider offshoring IT work to India to achieve spending cuts, according to analyst firm Ovum.
A malicious application that conceals spyware and GPS tracking behind a mobile phone game has been discovered in the Android app store.
Although the global downturn slowed security revenue to 7% growth in 2009, organizations globally have indicated their intention to give priority to security budgets, says Gartner.
Research released by credit reference agency Experian claims to show that the careless use of passwords on the internet is creating an identity theft paradise of criminals.
FaceTime Communications has unveiled a software-as-a-service (SaaS) version of its Unified Security Gateway technology, which allows enterprises to gain granular control over the use of Web 2.0 and social networking systems plus services.
The PCI Security Standards Council (SSC) has provided a preview of upcoming changes to two of its standards covering the payment card industry.
Research carried out by the University of Pennsylvania claims to show that it possible to make an intelligent guess as to a smartphone users’ handset password by the density and direction of the `smudges’ on the mobile’s touch screen.
CESG, the national technical authority for information assurance across the public sector, has announced it is adopting the Institute of Information Security Professionals (IISP) skills framework as the basis for its own professional skills and compete…
A representative from the Microsoft Security Response Center said the company is investigating the security flaw disclosed earlier this week but that it will not issue a separate advisory based on current information.
In ArcSight’s Silicon Valley office, Rick Caccia, the infosec firm’s vice president of product marketing, tells Infosecurity’s editor, Eleanor Dallaway, that in addition to the constant tide of cybercrime, it’s huge amounts of data that are driving thi…