Wednesday, August 28, 2013

How Cybercriminals Operate | Beyond IT Service Management | Security Pro Guide to Tablet PCs

If you have trouble viewing this email, read the online version.

InformationWeek Analytics Newsletter
masthead
August 28, 2013
InformationWeek Reports Newsletter
 
Featured Content
>
>
>
>
>
>
>
>
>

Barnaby Jack And The Hacker Ethos

Barnaby Jack's untimely death should give us pause to remember why folks hack things and ultimately why pushing the boundaries of technology benefits us all.
Read More


Hacking The Emergency Alerting System

More EAS devices vulnerable now than when vendors were alerted in January.

Read More


Maltego Gets More 'Teeth'

New features in Maltego, an open-source intelligence tool for defenders, allow penetration testers and attackers to gather data on vulnerable systems and manage botnets

Read More



 
 More Resources
Combating Smartphone Theft
Find out how law enforcement agencies and cellular networks are working to combat smartphone theft through checking and blocking IMEI numbers, and the direction theft prevention is taking.

IT in Search of Integrated Service Management
Managing IT services today is more challenging than ever. Tame escalating demands and complexity by adopting a standards-based strategy that automates, simplifies and evolves IT service management. Learn what's holding IT back from designing and implementing a plan--and get a potential way forward.

SIEM: 2013 Gartner Magic Quadrant
IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements.

Big Security for Big Data
The multitude of devices, users, and generated traffic all combine to create a proliferation of data that is being created with incredible volume, velocity, and variety. As a result, organizations need a way to protect, utilize, and gain real-time insight from "big data." So, how do you get started?

Upping the Battle Against Advanced Threats
A new approach is needed to win the cyberwar. Read this whitepaper to learn about a new cybercrime prevention approach that provides unparalleled protection against spear-phishing, drive-by downloads and advanced, information-stealing malware, which enable targeted attacks, with no management load for IT staff or disruption to end users.



SECURITY

How Attackers Target and Exploit Social Networking Users - Sponsored by Trusteer
As social networking becomes increasingly embedded into business processes, security professionals are challenged to balance flexibility and security. Dark Reading examines the growing role of social networks in the enterprise and the new vulnerabilities it is opening up, breaks down the types of attacks being waged via social media sites, and recommends strategies for keeping end users and corporate data alike safe.

How Cybercriminals Operate - Sponsored by Vormetric
Knowing your enemy is the first step in guarding against him. In this Dark Reading report, we examine the world of cybercriminals - including their motives, resources and processes - and recommend what enterprises should do to keep their data and computing systems safe in the face of an ever-growing and ever-more-sophisticated threat.

The Security Pro's Guide to Tablet PCs - Sponsored by Absolute
As businesses rely increasingly on tablets for the productivity benefits they provide, IT must address the security challenges the devices present. Here's a look at how to build a comprehensive tablet security strategy.

Applications Monitoring For Security Professionals - Sponsored by IBM
When it comes to monitoring, the application space is often forgotten. This leaves a gaping hole because the behavior of applications can reveal a great deal about security events and their causes. In this report, we make the case for the development of an applications monitoring strategy and provide recommendations for implementation that tap into existing products and processes.

IT AS A SERVICE

Beyond IT Service Management - Sponsored by FrontRange
There are two ways to look at an IT as a service model: as a well-intentioned but jargon- and bureaucracy-filled worldview or as a fully integrated, engaged and involved part of the company's operations. You can guess which one we recommend, and it seems the 409 respondents to our InformationWeek 2013 Service-Oriented IT Survey agree.

DIGITAL ISSUES

[BIG DATA] Blinded By Big Data - Sponsored by IBM
Making decisions based on flashy macro trends while ignoring "little data" fundamentals is a recipe for failure.

[CLOUD COMPUTING ] Cloud Software: Where Next? -Sponsored by dtSearch & kony
Want to relegate cloud software to edge apps or smaller businesses? No way. Read InformationWeek's August special issue on cloud's changing role in enterprise applications.

[GOVERNEMENT] Tech Priorities - Sponsored by Affigent, DLT Solutions & Thawte
Bold visions are competing with practical budget realities for federal IT leaders. Our latest annual survey looks at the top IT priorities.

[SECURITY ] The Changing Face Of APTs - Sponsored by NeuStar
Advanced persistent threats are evolving in motivation, malice and sophistication. Are you ready to stop the madness?

InformationWeek Reports is brought to you by Absolute, FrontRange, HP, IBM, Trusteer, Vormetric and UBM Tech.


You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter.

If you received this newsletter from a friend and want to join.
Read about and join other InformationWeek Newsletters here.

UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy

 

No comments:

Post a Comment