Tuesday, April 9, 2013

Security Job Market Rocks | How Attackers Choose Vulnerabilities

If you have trouble viewing this email, read the online version.

InformationWeek Analytics Newsletter
masthead
April 9, 2013
Follow us:  
InformationWeek Reports Newsletter
 
Featured Content
>
>
>
>
>
>
>
>
>
>

Editor's Note China: Got Attitude?
By Tom Parker

In the US, the general perception in and outside of the security industry is that China-based threat actors simply don't care about attribution. Given the outwardly brazen appearance of the many attacks thought to have originated from China, one could certainly be forgiven for making this assumption. I firmly believe that what is actually going on is far more deeply nuanced than we are giving the Chinese credit for.
Read More




 
 More Resources
BYOD In Schools
In today's educational environment, more and more students and staff are bringing in their own Wi-Fi devices into the school's network. This white paper can help you address the security and management of multiple devices being introduced into your network.

Energy Efficient Cooling for Data Centers
As power density in the data center increases, it becomes harder to cool these higher power loads. Learn about the efficiency benefits of row-based cooling compared to other common cooling architectures.

Understanding Flat Networks
A flat network or fabric provides more paths through the network and can maximize bandwidth and better support a highly virtualized data center. Understand your options for standards-based approaches to designing a flat network.



IT SALARY SURVEY

Security Pros In High Demand: Unemployment Rate Zero
Mark Weatherford, Department of Homeland Security deputy undersecretary for cybersecurity, recently stressed the need to develop more cybersecurity talent in the U. S. "What's the unemployment rate for a good cybersecurity person? Zero," he said. The market is rocking.

Health IT: Room For Salary Growth, But High Confidence in Employment Prospects
Salaries for healthcare IT may not match some lucrative sectors — just over half, 53%, of staffers will collect bonuses in 2013. The flip side is a high level of confidence in continued employment, with 91% saying they feel very or somewhat secure in their present jobs.

SECURITY

How Attackers Choose Which Vulnerabilities To Exploit Sponsored by Lumension
In the increasingly complex world of information security, it's important for security professionals to be able to understand not only how their organization's systems and data may be compromised but why. We provide recommendations for getting out in front of hackers by using some of the same tools and strategies they do.

Identifying and Remediating Security Vulnerabilities In the Cloud Sponsored by HP
The cloud promises - and often delivers - tremendous cost savings and agility for enterprises. However, whether a company is leveraging the public cloud, a private cloud or some combination thereof, the security equation changes significantly when the cloud is a factor. This report delivers advice for plugging holes in the model.

How To Boost Security Via FFIEC Compliance Sponsored by TraceSecurity
With just a smartphone, users can conduct nearly all their banking business at any time of the day or night. However, guidelines laid out by the FFIEC several years ago predate many of the capabilities -- and vulnerabilities -- in place today. We provide advice on how you can extend the work done to comply with FFIEC to strengthen your organization's overall security posture.

Insecurity with Java Sponsored by Imperva
In the wake of a zero-day vulnerability being exploited by multiple active attacks, IT teams wait for Oracle to respond. Again. Here's how to keep your systems safe, but meanwhile, start considering: Does Java's popularity as an attack vector vs. its diminishing functionality make permanently disabling plug-ins a smart idea?

DATABASES

Research: 2013 State of Database Technology
Among more than 700 database survey respondents, use of virtualization is up; 91% are using, piloting or investigating Hadoop; and 16% are leveraging cloud for their primary databases. But pricing is still a sore point, and security advances are elusive.

NEXT GEN NETWORKS

3 Paths To Network Convergence Sponsored by XO Communications
Separate data and storage networks might have been necessary when Fast Ethernet was pitted against Fibre Channel, but Ethernet's evolution has obviated most of the performance differences. We outline three deployment scenarios for those who want to merge data and storage networks.

STORAGE AND SERVERS

Research: 2013 State of Storage Survey Sponsored by Schneider Electric
Storage hardware and software innovation is paying off for IT: Ethernet is soaring, with a combined year-over-year boost of 20 points in iSCSI and FCoE, and 60% of organizations now encrypt at least some stored data.

EDUCATION

Best Practices: Top Tech Tools for Educators Sponsored by HP
Taking a cue from the business world, education IT directors are leveraging technologies and models that allow them to implement the right products and services for schools right now.

InformationWeek Reports is brought to you by HP, Imperva, Lumension, Schneider Electric, TraceSecurity, XO Communications and UBM TechWeb.


You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter.

If you received this newsletter from a friend and want to join.
Read about and join other InformationWeek Newsletters here.

UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy

 

No comments:

Post a Comment