Tuesday, July 16, 2013

2013 State of Mobile Security | How Cybercriminals Operate | Wireless LAN Survey

If you have trouble viewing this email, read the online version.

masthead
July 16, 2013
Follow us:  
InformationWeek Reports Newsletter
 
Featured Content
>
>
>
>
>
>
>
>
>
>
>
>
>

Letter Of (Cyber) Marque And Reprisal
Facilitating future 'hack back' programs.



Read More

There is No Security Silver Bullet, but What if...
Breaking security challenges down to identify new approaches and innovations.



Read More



 
 More Resources
A Guide to Affordability, Security, and Flexibility of Cloud Backup
This resource answers the common questions enterprises have about cloud backup & recovery including its security, affordability, and flexibility.

Big Security for Big Data
The multitude of devices, users and generated traffic all combine to create a proliferation of data that is being created with incredible volume, velocity and variety. You need a way to protect, utilize and gain real-time insight from "big data." So, how do you get started?

Building & Enforcing An Endpoint Security Strategy
With endpoint technology changing rapidly, what's the best approach to building an effective, enforceable endpoint security strategy that works across the enterprise? We examine the challenges of endpoint security and recommend the steps organizations should take toward developing a security strategy that is both effective and practical.

8 Trends That Are Changing Network Security
We need to think about security policies and where and how to provide protection. Read about eight trends we think will impact network security and your security strategy.



IT AS A SERVICE

2013 IT Spending Priorities Survey Sponsored by FrontRange
When IT is seen as just a cost center, the business loses. Yet many CIOs are barely keeping their budgets flat; some must even absorb cuts. It's hard to innovate when you're scraping to pay for basic security. In this report, we examine the fallout when IT is reduced to just "keeping the lights on," and discuss ways to break the cycle.

MOBILITY & WIRELESS

2013 State of Mobile Security Sponsored by IBM
Incidents of mobile malware are way up, researchers say, and 78% of respondents worry about lost or stolen devices. But while many teams are taking mobile security more seriously, 42% still skip scanning completely, and just 39% have MDM systems in place.

BACKUP & RECOVERY

(At Least) One Thing You Don't Know About Cloud Backup Sponsored by Asigra
If you're not using the cloud for data protection, you're missing out. That's clear to our InformationWeek Cloud Storage Survey ­respondents: 50% check off backup and recovery, 51% do or plan to use services for mobile devices, and 35% have designated both RTO and RPO points for data in the cloud.

CLOUD COMPUTING

Why You Need a Cloud Service Broker
Enterprises are adopting multiple cloud services for better ­performance and service options. That's smart, but managing private and public cloud services, some of which are being used by business units without IT's consent, can get complicated fast. Cloud service broker products aim to create harmony among the clouds.

DATA RECOVERY

Comparison: Comprehensive Data Recovery Sponsored by Asigra
Comprehensive data recovery-it's a tall order. We asked a lot from vendors in this Buyer's Guide, from the ability to back up data from mobile devices, desktops, and physical and virtual servers to local and cloud repositories to the ability for end users and IT to restore individual files, directories, and entire devices or disk partitions on a self-service basis. Learn which companies pull it off.

SECURITY

Below the Application: The High Risk of Low-Level Threats Sponsored by Trusteer
Hacking history is rich with ingeniously designed attacks that span the surface of computing, from the most basic "creeper" to APTs perpetrated by nation states. Learn how low level-attacks-such as OS exploits, rootkits, and other advanced malware-are still very much alive and kicking, and challenging the security of networks around the world.

5 Most Common Security Pitfalls in Software Development Sponsored by Imperva
Most software developers are focused on speed and ease of use, and security sometimes takes a back seat. This special report looks at the enterprise software development process and the most common security mistakes that companies make-and how to avoid them.

How Cybercriminals Operate Sponsored by Vormetric
Knowing your enemy is the first step in guarding against him. In this Dark Reading report, we examine the world of cybercriminals-including their motives, resources and processes - and recommend what enterprises should do to keep their data and computing systems safe in the face of an ever-growing and ever-more-sophisticated threat.

Strategy: How Enterprises Can Use Big Data To Improve Security Sponsored by IBM
There's a lot of confusion about what big data really is and what role it can-and should-play in security. In this Dark Reading report, we examine how big data can be used to complement existing security efforts, how big data and SIEM are alike and different, and what companies need to do to get ready for the big data security shift.

Evaluating & Choosing Threat Intelligence Tools Sponsored by HP
Effective enterprise security requires the ability to monitor and compare anomalous behavior over time, connecting the dots among multiple events. Threat intelligence tools and services can help organizations collect and make sense of the disparate data that can shine a light on events leading up to an attack. In this report, we look at the types of products available and offer recommendations on how to evaluate and select them.

10 Most Common Security Vulnerabilities in Enterprise Databases Sponsored by IBM
Databases are among the most vulnerable systems in any enterprise, because of both the information they contain and their complexity. Knowing how and why database systems are at risk is the first step to effectively secure them.

Monitoring & Reporting IT Security Risk In Your Organization Sponsored by HP
Assessing and reporting risk is a challenge, and organizations that want to approach risk in a systematic way face significant obstacles-but it is possible to adopt a structured risk management strategy while keeping data current. Get proven strategies and tools for harnessing data in a way that's relevant and meaningful, and can be effectively reported to all stakeholders.

2013 Wireless LAN Survey Sponsored by Symantec
Given the cost of cellular access, the multiplying number of mobile devices and the imminent ratification of the superfast 802.11ac specification, we decided to survey InformationWeek readers about their wireless LANs today and plans for the future. Among the 419 respondents to our InformationWeek 2013 Wireless LAN Survey, 89% use 802.11n technologies as a network access method for end users, up from 76% in September 2010.

InformationWeek Reports is brought to you by Asigra, FrontRange, IBM, Imperva, Symantec, Trusteer, Vormetric and UBM Tech.


You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter.

If you received this newsletter from a friend and want to join.
Read about and join other InformationWeek Newsletters here.

UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy

 

No comments:

Post a Comment