Tuesday, January 15, 2013

Mobility & BYOD Survey Results | How Cybercriminals Choose a Target | Cloud ID Mgmt

If you have trouble viewing this email, read the online version.

masthead

InformationWeek Reports Newsletter

January 15, 2013
Featured Content
>
>
>
>
>
>
>
>
>

What Is It You Would Say That You Do Here?
Here is a dangerous question to start the new year: Does your company actually need a security department? If you are doing CYA instead of CIA, the answer is probably no.
Get More Information

New Year Java Zero-Day Attacks Under Way
Weather, news, adult websites getting hit, crimeware kits loaded with new exploits using the bug.
Get More Information


Single Sign-On Mythbusting
SSO is not an IAM or security cure-all, but it isn't a security killer either.
Get More Information



 
Follow us:  
 More Resources
7 Tips for Safer Cloud Computing
The cloud is supposed to be a "cure-all", but it also creates numerous new security issues for SMBs. Learn what 7 tips you must have before you commit to any service.

Dell 3-2-1 Reference Configurations: High-Availability Virtualization
Dell 3-2-1 Reference Configurations take the guesswork out of designing, ordering, and deploying your virtualized infrastructure in your data center.

A Cost Analysis of Approaches to DDoS Protection
DDoS can cost an organization in tangible losses and in more subtle ways. Read this whitepaper for a deeper perspective on the cost benefits of a dedicated, cloud-based DDoS service over an in-house hardware solution or over-provisioning through your ISP.

Mobile Device Management Buyers Guide
By using an Mobile device management (MDM) solution to control and protect the data and configuration settings on users' mobile devices, you can reduce support costs and security risks. In this guide, you'll learn what you need to consider to find a MDM solution that best fits your needs.



Security

5 Flaws and 5 Fixes For Small And Midsize Companies - Sponsored by Symantec
Take a sneak peek at data from the Dark Reading/InformationWeek 2011 Strategic Security Survey, with a focus on the five biggest problems faced by small and midmarket companies. You'll get a look at key security practices and processes for managing the complexity of security; enforcing policies; assessing risk; preventing data breaches; and managing scarce IT resources.

Cloud ID Management - Sponsored by HP
Identity management is tricky, especially for cloud and SaaS applications. How do you build an identity management framework for all your cloud applications? The four approaches you can use are either full or partial Active Directory synchronization, federation or identity-as-a-service. This report discusses how they work, and the upsides and downsides of each option.

8 Steps to Securing Small Databases - Sponsored by IBM
In this report, we recommend database security strategies and tools for smaller enterprises and workgroups--as well as for smaller databases--that have a big stake in protecting their data but don't have big budgets or skilled, and dedicated, security staff.

How Cybercriminals Choose Their Targets and Tactics - Sponsored by Trusteer
They are out to get you, make no mistake. But there are things you can do to make sure that your organization is unappealing to a cybercriminal bent on finding easy pickings. The key is to understand what cybercriminals are looking for and how they go about the business of infiltrating vulnerable systems and networks.

6 Security Services Every Small Business Must Have - Sponsored by Verisign
Small and midsize businesses have a big security problem: They are vulnerable to the same kinds of attacks as large enterprises, but they often don't have the same resources for fending off, or recovering from, those attacks. Security ­services can help small and midsize businesses get and stay secure. In this ­report, Dark Reading examines the reasons why MSSPs make sense for SMBs, recommends the six categories of services that every SMB needs, and ­provides tips for evaluating and hiring providers.

Mobility & Wireless

2012 Mobility & BYOD Staffing Survey
IT is forging ahead with mobile computing plans but may not be able to find the desired skills--or the budget to pay for them. While 15% of respondents to our survey say they plan to ­increase staff in the area of mobility in the next year, 38% of those who identify it as a top area of staffing increase say a shortage of workers is holding them back from adopting mobile tech, and 19% worry that salary demands will exceed their budget or that they won't be able to afford the people they need.

Smartphone Smackdown: Galaxy Note II vs. Lumia 920 vs. iPhone 5
Android and Windows Phone are not ceding ground to iOS — far from it. While lawyers for Apple, Samsung and Google battled in the courtroom, engineers geared up for the next battle in the smartphone war. And now Microsoft and its hardware partners have joined the fray with a new OS and fresh devices. We analyze the best each camp has to offer.

Breaking Down iOS 6 And iPhone 5 For Enterprise
Devices running Apple's latest mobile operating system -- including the iPhone 5 -- are all over your network. Learn how to keep your users safe and productive, and find out about the six features in iOS 6 IT pros will love or hate.

Healthcare

The Next Phase of Meaningful Use
Stage 2 raises requirements for health information exchanges, EHR interoperability and patient involvement. For the first time, providers will have to engage patients in their own care or risk losing out on incentive payments.


InformationWeek Reports is brought to you by Dell, ESET, HP, IBM, Symantec, Trusteer, Verisign and UBM Tech.


You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter.

If you received this newsletter from a friend and want to join.
Read about and join other InformationWeek Newsletters here.

UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy

 

No comments:

Post a Comment