SECURITY Strategy: Improve Web App Security Sponsored by Imperva Web applications are fraught with risk, but for most companies, not having them is not an option. They're just too important to customers and to the business. In this Dark Reading report, we recommend some best practices for balancing the needs of the business with security requirements. It doesn't take special certification or a million dollars, but it does take planning, time, and a smart combination of tools and best practices. 8 Most Common Causes of Data Breaches Sponsored by Vormetric It seems as though not a day goes by without a headline screaming that some organization has experienced a data breach, putting the business — and its customers and partners — at risk. To keep your own organization out of the news, it's important to understand the most common causes of data breaches and what you can do to mitigate the threats they present. 2013 Strategic Security Survey In our last Strategic Security Survey report, we said most infosec pros are too willing to pin the blame for problems on end users, the CFO, vendors, developers -- anywhere but ourselves. Harsh? Maybe, but the message seems to have stuck. Our 2013 data shows that security professionals realize we need to own our strategies. Our 1,029 respondents are getting wise on awareness, with just 13% saying they're more vulnerable than last year. Still, 73% see mobility as a threat, and 75% admit they may be ignorant of a breach. 5 Ways To Better Hunt The Zebras In Your Network Sponsored by HP This issue of InformationWeek's Must Reads explores ways to protect vulnerable users in your company, lessons learned from the Evernote breach, how the FBI is improving enterprise insider theft detection and more. How Attackers Choose Which Vulnerabilities To Exploit Sponsored by Lumension In the increasingly complex world of information security, it's important for security professionals to be able to understand not only how their organization's systems and data may be compromised but why. In this Dark Reading report we examine why certain vulnerabilities are exploited, by whom and with what. DATA CENTER Can Huawei Succeed in the U.S.? Sponsored by NEC Huawei faces significant headwinds as it tries to gain a foothold in the enterprise hardware market, according to the 454 respondents to our InformationWeek Huawei Technologies Outlook Survey. Almost half, 47%, consider the company a serious threat in the networking market, with just 34% calling the government ban on carriers buying Huawei equipment for U.S. networks a deal breaker. What's your stance?
2013 Backup Technologies Survey Sponsored by Schneider Electric Think backups are boring? Not so, say more than 500 IT pros. Most use two, three or even more different backup applications, and the percentage encrypting all media has jumped 15 points since 2011.
NETWORK INFRASTRUCTURE 2013 Wireless LAN Survey Sponsored by Symantec Given the cost of cellular access, the multiplying number of mobile devices and the imminent ratification of the superfast 802.11ac specification, we decided to survey InformationWeek readers about their wireless LANs today and plans for the future. Among the 419 respondents to our InformationWeek 2013 Wireless LAN Survey, 89% use 802.11n technologies as a network access method for end users, up from 76% in September 2010.
InformationWeek Reports is brought to you by HP, Imperva, Lumension, NEC, Schneider Electric, Symantec, Vormetric and UBM Tech. You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter. If you received this newsletter from a friend and want to join. Read about and join other InformationWeek Newsletters here. UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy
| |
No comments:
Post a Comment