Tuesday, May 28, 2013

2013 Wireless LAN | 8 Causes of Data Breaches | 2013 Strategic Security

If you have trouble viewing this email, read the online version.

masthead
May 28, 2013
Follow us:    
InformationWeek Reports Newsletter
 
Featured Content
>
>
>
>
>
>
>
>

Use A Human Trust Model For Endpoints
Use anthropomorphic references to engage your brain and strengthen your approach to security.
Read More

Security War Games
Information security keeps evolving, but our educational methods are not evolving rapidly enough to win the cold cyberwar.
Read More



 
 More Resources
Data Security in the Cloud
Learn the latest cloud security challenges and techniques for protecting data in the cloud. Get practical strategies for secure transition to the cloud.

Mobile Device Security: What's Coming Next?
Mobile devices and their rapid innovation and development are enabling busy professionals to conduct business and manage their lives on the move. But what are the key technologies driving evolution of the mobile, what happens next, and what are the security implications?

2013 Forrester Mobile Security Predictions
In this report, Forrester looks at current market and technology adoption trends and makes its mobile security predictions.

Avoid Hazards of IT Consolidation
Many IT consolidation projects suffer from poor planning and implementation issues that ultimately impact application performance and user productivity. This technology brief investigates the processes and tools that are needed to provide complete enterprise visibility and WAN acceleration for high-priority traffic.



SECURITY

Strategy: Improve Web App Security Sponsored by Imperva
Web applications are fraught with risk, but for most companies, not having them is not an option. They're just too important to customers and to the business. In this Dark Reading report, we recommend some best practices for balancing the needs of the business with security requirements. It doesn't take special certification or a million dollars, but it does take ­planning, time, and a smart combination of tools and best practices.

8 Most Common Causes of Data Breaches Sponsored by Vormetric
It seems as though not a day goes by without a headline screaming that some organization has experienced a data breach, putting the business — and its customers and partners — at risk. To keep your own organization out of the news, it's important to understand the most common causes of data breaches and what you can do to mitigate the threats they present.

2013 Strategic Security Survey
In our last Strategic Security Survey report, we said most infosec pros are too willing to pin the blame for problems on end users, the CFO, vendors, developers -- anywhere but ourselves. Harsh? Maybe, but the message seems to have stuck. Our 2013 data shows that security professionals realize we need to own our strategies. Our 1,029 respondents are getting wise on awareness, with just 13% saying they're more vulnerable than last year. Still, 73% see mobility as a threat, and 75% admit they may be ignorant of a breach.

5 Ways To Better Hunt The Zebras In Your Network Sponsored by HP
This issue of InformationWeek's Must Reads explores ways to protect vulnerable users in your company, lessons learned from the Evernote breach, how the FBI is improving enterprise insider theft detection and more.

How Attackers Choose Which Vulnerabilities To Exploit Sponsored by Lumension
In the increasingly complex world of information security, it's important for security professionals to be able to understand not only how their organization's systems and data may be compromised but why. In this Dark Reading report we examine why certain vulnerabilities are exploited, by whom and with what.

DATA CENTER

Can Huawei Succeed in the U.S.? Sponsored by NEC
Huawei faces significant headwinds as it tries to gain a foothold in the enterprise hardware market, according to the 454 respondents to our InformationWeek Huawei Technologies Outlook Survey. Almost half, 47%, consider the company a serious threat in the networking market, with just 34% calling the government ban on carriers buying Huawei equipment for U.S. networks a deal breaker. What's your stance?

2013 Backup Technologies Survey Sponsored by Schneider Electric
Think backups are boring? Not so, say more than 500 IT pros. Most use two, three or even more different backup applications, and the percentage encrypting all media has jumped 15 points since 2011.

NETWORK INFRASTRUCTURE

2013 Wireless LAN Survey Sponsored by Symantec
Given the cost of cellular access, the multiplying number of mobile devices and the imminent ratification of the superfast 802.11ac specification, we decided to survey InformationWeek readers about their wireless LANs today and plans for the future. Among the 419 respondents to our InformationWeek 2013 Wireless LAN Survey, 89% use 802.11n technologies as a network access method for end users, up from 76% in September 2010.

InformationWeek Reports is brought to you by HP, Imperva, Lumension, NEC, Schneider Electric, Symantec, Vormetric and UBM Tech.


You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter.

If you received this newsletter from a friend and want to join.
Read about and join other InformationWeek Newsletters here.

UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy

 

No comments:

Post a Comment