Tuesday, January 22, 2013

Java Insecurity | Cloud Standards | Cybersecurity on the Offense

If you have trouble viewing this email, read the online version.

masthead

InformationWeek Reports Newsletter

January 22, 2013
Featured Content
>
>
>
>
>
>
>


The Death Of Java In The Enterprise?
The continued waves of Java zero-days have security experts recommending that enterprises reevaluate how they use Java
Get More Information

How Well Do You Know Your Data?
The more you know about your data, the more effectively you can protect it.
Get More Information


Microsoft Issues Patch For Critical IE Vulnerability
Internet Explorer flaw could enable attackers to take over a user's computer
Get More Information



 
Follow us:  
 More Resources
2012 Cost of Cyber Crime in the US
This study focuses on quantifying the economic impact of cyber attacks and observes cost trends over time.

Adaptive Behavior-Based Malware Protection
Evolved malware disguises its appearance to evade reactive security measures of all kinds, but while each new instance in a malware "family" may appear different, its behavior can't be disguised. Learn how to protect yourself.

Identity and Access Management as a Service
Confidently answer the question "who has access to what" across all of your key applications, no matter if they are on-premise or cloud-based.

Application Protection on the Endpoint - The Last Line of Defense
Discover how you can protect your organization and it's end users with a proven approach to combating advanced threats: Application Protection.



Security

Cybersecurity on the Offense
Can you — and should you — strike back at attackers? It's a complex question with deep ethical, legal and practical considerations. While governments have drawn lines in the sand, for the private sector it's still early days in the offensive cyber security era. You can, however, be proactive. Here's how.

Alert: Java Insecurity
In the wake of a zero-day vulnerability being exploited by multiple active attacks, IT teams wait for Oracle to respond. Again. Here's how to keep your systems safe, but meanwhile, start considering: Does Java's popularity as an attack vector vs. its diminishing functionality make permanently disabling plug-ins a smart idea?

Making Insiders Foot Soldiers in Enterprise Security
Insider threat-borne attacks remain the minority of data breaches but tend to inflict the most damage -- especially when it comes to intellectual property theft. Here's a look at the hot trends and tips on how to flip the equation in the insider threat.

A Guide to Database Activity Monitoring - Sponsored by IBM
Database activity monitoring, or DAM, is an effective compliance and security strategy. However, not every DAM system will work the same in every organization. Indeed, not every organization can even make use of every feature that DAM systems provide. In this report, we examine what DAM can and can't do, and recommend how to evaluate and implement the best system for your organization.

6 Steps To A Risk-Based Security Strategy - Sponsored by Tripwire
Interesting report that doesn't just talk about risk-based security strategies, but offers some real insight about how to implement them. Readers, have you successfully implemented a risk-based strategy? Would love to hear about it.

Cloud Computing

Informed CIO: Cloud Standards
IT has good reason to demand standardization in SaaS, IaaS and PaaS offerings. But what's interesting is that vendors themselves are just as interested and, in many cases, are driving standards efforts. In a market this fast-moving, the old top-down model is being turned on its head.

Strategy, 5 Keys to Painless Encryption - Sponsored by HP
Encryption is frequently used as the primary method to keep data from being stolen or destroyed. Our 2012 State of Encryption Survey profiles the struggles most IT groups have when trying to manage encryption products. Simply put, the old adage that "encryption is easy, key management is hard" still holds. But we think the game is changing. If you feel stuck with hard decisions and are seeking guidance when it comes to encryption, read on.

InformationWeek Reports is brought to you by Aveska, HP, IBM, Symantec, Tripwire, Trusteer and UBM Tech.


You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter.

If you received this newsletter from a friend and want to join.
Read about and join other InformationWeek Newsletters here.

UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy

 

No comments:

Post a Comment