Tuesday, February 12, 2013

Passwords Don’t Work. Now What? | Security Staffing Insights

If you have trouble viewing this email, read the online version.

InformationWeek Analytics Newsletter
masthead
February 12, 2013
Follow us:  
InformationWeek Reports Newsletter
 
Featured Content
>
>
>
>
>


Security No-Man's Land
By Mike Rothman

As the industry descends on the RSA Conference to discuss the latest in security, the underserved midmarket continues to struggle with basic blocking and tackling. These folks have a couple hundred to a couple thousand employees. That's big enough to have real data interesting to attackers, but not big enough to have a dedicated security staff. The attackers seem to sneak by them on a regular basis.
Read More




 
 More Resources
Dealing with Advanced and Targeted Attacks
Learn about the evolution of advanced targeted attacks, approaches to address them and how you should think about your malware defense strategy.

The Cost of Cybercrime
The loss or misuse of information is the most significant consequence of a cyber attack, and it comes at significant financial cost.

Five Critical Components of an Information Security Program
Learn five components that any information security solution must include to cost effectively and efficiently protect information and meet regulatory requirements.

Deliver Identity and Access Management -- As a Service
Confidently answer the question "who has access to what" across all of your key applications, no matter if they are on-premise or cloud-based.


Security

Passwords Don't Work. Now What?
Major database breaches and easy-to-crack selections underscore the vulnerability of our most common authentication mechanism. So what's the alternative for protecting our online lives? To find out, we polled a range of security experts.

Boost Mobile Security Using Apple's Global Proxy
The addition of a global HTTP proxy in Apple's iOS 6, in combination with more mature cloud security services and enterprise management tools, makes it easier to protect data in a mobile environment. But privacy, policy and platform support are still sticking points.

IT Strategy

Security Staffing Survey
Hiring the wrong security pro could set your company back years. But finding the right person isn't easy: 39% of respondents to our staffing survey at security-focused companies say people with the required skill sets may be hard to find, and 18% say salary demands may exceed their budgets. We recommend steps to identify and hire the best security pros.

UC and Social Networking

State of Unified Communications - sponsored by Mitel
We surveyed more than 300 business technology professionals on plans for advancing their companies' UC initiatives. The percentage of respondents reporting they have deployed and are using UC jumped to 36%, from 30% one year earlier; an additional 31% say they plan to deploy within the next 24 months.

Review: 9 Conference Calling and Social Apps
The latest in our quarterly series: two complementary technologies that we expect to see come together in the not-too-distant future: advanced conference calling and enterprise social networking.

InformationWeek Reports is brought to you by Mitel, Trusteer, HP, Trust Security, Aveksa and UBM Tech.


You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter.

If you received this newsletter from a friend and want to join.
Read about and join other InformationWeek Newsletters here.

UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy

 

No comments:

Post a Comment