Security Cybersecurity on the Offense Can you — and should you — strike back at attackers? It's a complex question with deep ethical, legal and practical considerations. While governments have drawn lines in the sand, for the private sector it's still early days in the offensive cyber security era. You can, however, be proactive. Here's how. Alert: Java Insecurity In the wake of a zero-day vulnerability being exploited by multiple active attacks, IT teams wait for Oracle to respond. Again. Here's how to keep your systems safe, but meanwhile, start considering: Does Java's popularity as an attack vector vs. its diminishing functionality make permanently disabling plug-ins a smart idea? Making Insiders Foot Soldiers in Enterprise Security Insider threat-borne attacks remain the minority of data breaches but tend to inflict the most damage -- especially when it comes to intellectual property theft. Here's a look at the hot trends and tips on how to flip the equation in the insider threat. A Guide to Database Activity Monitoring - Sponsored by IBM Database activity monitoring, or DAM, is an effective compliance and security strategy. However, not every DAM system will work the same in every organization. Indeed, not every organization can even make use of every feature that DAM systems provide. In this report, we examine what DAM can and can't do, and recommend how to evaluate and implement the best system for your organization. 6 Steps To A Risk-Based Security Strategy - Sponsored by Tripwire Interesting report that doesn't just talk about risk-based security strategies, but offers some real insight about how to implement them. Readers, have you successfully implemented a risk-based strategy? Would love to hear about it.
Cloud Computing Informed CIO: Cloud Standards IT has good reason to demand standardization in SaaS, IaaS and PaaS offerings. But what's interesting is that vendors themselves are just as interested and, in many cases, are driving standards efforts. In a market this fast-moving, the old top-down model is being turned on its head.
Strategy, 5 Keys to Painless Encryption - Sponsored by HP Encryption is frequently used as the primary method to keep data from being stolen or destroyed. Our 2012 State of Encryption Survey profiles the struggles most IT groups have when trying to manage encryption products. Simply put, the old adage that "encryption is easy, key management is hard" still holds. But we think the game is changing. If you feel stuck with hard decisions and are seeking guidance when it comes to encryption, read on.
InformationWeek Reports is brought to you by Aveska, HP, IBM, Symantec, Tripwire, Trusteer and UBM Tech. You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter. If you received this newsletter from a friend and want to join. Read about and join other InformationWeek Newsletters here. UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy
| |
No comments:
Post a Comment