IT SALARY SURVEY Security Pros In High Demand: Unemployment Rate Zero Mark Weatherford, Department of Homeland Security deputy undersecretary for cybersecurity, recently stressed the need to develop more cybersecurity talent in the U. S. "What's the unemployment rate for a good cybersecurity person? Zero," he said. The market is rocking. Health IT: Room For Salary Growth, But High Confidence in Employment Prospects Salaries for healthcare IT may not match some lucrative sectors — just over half, 53%, of staffers will collect bonuses in 2013. The flip side is a high level of confidence in continued employment, with 91% saying they feel very or somewhat secure in their present jobs. SECURITY How Attackers Choose Which Vulnerabilities To Exploit Sponsored by Lumension In the increasingly complex world of information security, it's important for security professionals to be able to understand not only how their organization's systems and data may be compromised but why. We provide recommendations for getting out in front of hackers by using some of the same tools and strategies they do.
Identifying and Remediating Security Vulnerabilities In the Cloud Sponsored by HP The cloud promises - and often delivers - tremendous cost savings and agility for enterprises. However, whether a company is leveraging the public cloud, a private cloud or some combination thereof, the security equation changes significantly when the cloud is a factor. This report delivers advice for plugging holes in the model.
How To Boost Security Via FFIEC Compliance Sponsored by TraceSecurity With just a smartphone, users can conduct nearly all their banking business at any time of the day or night. However, guidelines laid out by the FFIEC several years ago predate many of the capabilities -- and vulnerabilities -- in place today. We provide advice on how you can extend the work done to comply with FFIEC to strengthen your organization's overall security posture.
Insecurity with Java Sponsored by Imperva In the wake of a zero-day vulnerability being exploited by multiple active attacks, IT teams wait for Oracle to respond. Again. Here's how to keep your systems safe, but meanwhile, start considering: Does Java's popularity as an attack vector vs. its diminishing functionality make permanently disabling plug-ins a smart idea?
DATABASES Research: 2013 State of Database Technology Among more than 700 database survey respondents, use of virtualization is up; 91% are using, piloting or investigating Hadoop; and 16% are leveraging cloud for their primary databases. But pricing is still a sore point, and security advances are elusive.
NEXT GEN NETWORKS 3 Paths To Network Convergence Sponsored by XO Communications Separate data and storage networks might have been necessary when Fast Ethernet was pitted against Fibre Channel, but Ethernet's evolution has obviated most of the performance differences. We outline three deployment scenarios for those who want to merge data and storage networks.
STORAGE AND SERVERS Research: 2013 State of Storage Survey Sponsored by Schneider Electric Storage hardware and software innovation is paying off for IT: Ethernet is soaring, with a combined year-over-year boost of 20 points in iSCSI and FCoE, and 60% of organizations now encrypt at least some stored data.
EDUCATION Best Practices: Top Tech Tools for Educators Sponsored by HP Taking a cue from the business world, education IT directors are leveraging technologies and models that allow them to implement the right products and services for schools right now.
InformationWeek Reports is brought to you by HP, Imperva, Lumension, Schneider Electric, TraceSecurity, XO Communications and UBM TechWeb. You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter. If you received this newsletter from a friend and want to join. Read about and join other InformationWeek Newsletters here. UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy
| |
No comments:
Post a Comment