Security Managing Mobile Security in Small and Midsize Businesses Sponsored by Symantec When it comes to mobile security, some concerns are common across all organizations. One of the biggest is the surge in the use of personal devices for business purposes - otherwise known as BYOD. However, the challenges for SMBs are heightened because these organizations often lack resources and expertise. In this Dark Reading report, we examine mobile security risks that are unique to SMBs and provide recommendations for tackling the problems. How Attackers Choose Which Vulnerabilities To Exploit Sponsored by Lumension In the increasingly complex world of information security, it's important for security professionals to be able to understand not only how their organization's systems and data may be compromised but why. In this Dark Reading report we examine why certain vulnerabilities are exploited, by whom and with what. We also provide recommendations for getting out in front of hackers by using some of the same tools and strategies they do. Building & Maintaining Database Access Control Provisions Sponsored by IBM Knotted and complex database access permissions are among the biggest threats to enterprise data security. In this Dark Reading report, we examine the problems associated with granting permissions to sensitive data, and recommend solutions that will help organizations thoughtfully and effectively grant privilege when and where it is needed - and only when and where it is needed.
5 Ways To Better Hunt The Zebras In Your Network Sponsored by HP This issue of InformationWeek's Must Reads explores ways to protect vulnerable users in your company, lessons learned from the Evernote breach, how the FBI is improving enterprise insider theft detection and more.
Strategies for Improving Web Application Security Sponsored by Imperva Web applications are fraught with risk, but for most companies, not having them is not an option. They're just too important to customers and to the business. In this Dark Reading report, we recommend some best practices for balancing the needs of the business with security requirements. It doesn't take special certification or a million dollars, but it does take planning, time, and a smart combination of tools and best practices.
Network Monitoring As a Security Too Sponsored by IBM The use of network monitoring tools in a security context can help companies fill gaps in protection as well as identify potential problems. Used strategically, network monitoring tools may help enterprises to detect potential security problems that they might otherwise have missed -- while also helping security organizations justify additional investment.
Building & Enforcing an Endpoint Security Strategy Sponsored by Symantec In today's enterprise, the endpoint could be any number of devices operating in any number of locations. With endpoint technology changing so rapidly, what's the best approach to building an effective, enforceable endpoint security strategy that works across the enterprise? In this Dark Reading report, we examine the challenges of endpoint security and recommend the steps organizations should take toward developing a security strategy that is both effective and practical.
Network Infrastructure 5 SDN Business Benefits Sponsored by NEC Have your engineers caught software-defined networking fever yet? While SDN is currently most appropriate for test labs or tech-savvy cloud operators like Google and Facebook, that's poised to change. As the technology matures and products proliferate, enterprise IT executives need a grasp of the potential benefits.
InformationWeek Reports is brought to you by HP, IBM, Imperva, Lumension, NEC, Symantec and UBM Tech. You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter. If you received this newsletter from a friend and want to join. Read about and join other InformationWeek Newsletters here. UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy
| |
No comments:
Post a Comment