Tuesday, February 26, 2013

Java Insecurity | Protecting The Mobile User

If you have trouble viewing this email, read the online version.

masthead
February 26, 2013
Follow us:   
InformationWeek Reports Newsletter
 
Featured Content
>
>
>
>
>
>
>
>


Editor's Note Application Security: How To Build Layered Defenses

Newly launched Application Security Tech Center will explore the ways that attackers target applications, and the latest exploits used to crack them. Just as important, we'll offer more in-depth coverage of how enterprises can build a layered defense to protect their applications. We'll also look at the application development process -- how security can be baked into new applications, and how you can vet new off-the-shelf applications for security.
Read More




 
 More Resources
Implementing Energy Efficient Data Centers
You can dramatically reduce the electrical consumption of typical data centers through design of the network-critical physical infrastructure and IT architecture. Learn how to quantify the electricity savings and greatly reduce electrical power consumption.

10 Steps for Early Incident Detection
Get this checklist of 10 effective steps you can take to get early indicators of a security incident.

Strategies For Protecting Web-Facing Databases
Web-facing databases have a huge target on their backs. Learn about several ways to secure databases with limited resources to keep



SECURITY

Insecurity with Java - Sponsored by Imperva
In the wake of a zero-day vulnerability being exploited by multiple active attacks, IT teams wait for Oracle to respond. Again. Here's how to keep your systems safe, but meanwhile, start considering: Does Java's popularity as an attack vector vs. its diminishing functionality make permanently disabling plug-ins a smart idea?

Strategy: Securing The Mobile User - Sponsored by Verdasys
Despite the growing acceptance of the bring-your-own-device — or BYOD — movement, there are a number of things working against IT. Fortunately, there are also a number of tools, some of them free, that security professionals can use along with strong policy and best practices to close the enterprise mobile security gap.

5 Keys to Painless Encryption - Sponsored by HP
Our 2012 State of Encryption Survey profiles the struggles most IT groups have when trying to manage encryption products. Simply put, the adage "encryption is easy, key management is hard" still holds. But the game is changing.

Eight Steps to Securing Small Databases - Sponsored by IBM
In this report, we recommend database security strategies and tools for smaller enterprises and workgroups--as well as for smaller databases--that have a big stake in protecting their data but don't have big budgets or dedicated security staff.

Achieving Compliance In The Smart Grid - Sponsored by TraceSecurity
In the energy business, strict compliance mandates could be all that stands between business as usual and a catastrophic, long-term power outage. Standards regulating the smart grid are often difficult to meet, but they can be leveraged by organizations in all industries to lock down corporate and customer assets.

STORAGE AND SERVERS

2013 State of Storage - Sponsored by Schneider Electric
A burst of innovation in storage hardware and software means better performance and integration. Some highlights: Ethernet is taking off, with a combined year-over-year boost of 20 points in iSCSI and FCoE; 60% now encrypt at least some stored data; 26% cite insufficient staffing as a top concern, up from 19% in 2012.

VIRTUALIZATION

Informed CIO: SDN and Server Virtualization On A Collision Course
First came VMMs and cloud software stacks for servers and storage, then SDN for networks; soon, the two will link to form what VMware calls "software-defined data centers." It's a nexus that's disrupting strategies at major IT vendors and, ultimately if not imminently, every enterprise data center.

UNIFIED COMMUNICATIONS

Strategy: The UC Identity Crisis - Sponsored by Mitel
Judging by our InformationWeek 2012 Unified Communications Survey, vendors looking to sell IT on unified communications systems aren't making as much headway as they'd like. In response, restless marketing executives are tacking on new capabilities and adding modifiers, like "collaboration" and "social business," in an effort to gain traction while simultaneously abandoning the "UC" terminology. So what does that mean for enterprise IT teams that just want to get everyone talking?

InformationWeek Reports is brought to you by HP, IBM, Imperva, Mitel, Schneider Electric, TraceSecurity, Tripwire, Verdasys and UBM TechWeb.


You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter.

If you received this newsletter from a friend and want to join.
Read about and join other InformationWeek Newsletters here.

UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy

 

No comments:

Post a Comment