SECURITY How Attackers Target and Exploit Social Networking Users - Sponsored by Trusteer As social networking becomes increasingly embedded into business processes, security professionals are challenged to balance flexibility and security. Dark Reading examines the growing role of social networks in the enterprise and the new vulnerabilities it is opening up, breaks down the types of attacks being waged via social media sites, and recommends strategies for keeping end users and corporate data alike safe. How Cybercriminals Operate - Sponsored by Vormetric Knowing your enemy is the first step in guarding against him. In this Dark Reading report, we examine the world of cybercriminals - including their motives, resources and processes - and recommend what enterprises should do to keep their data and computing systems safe in the face of an ever-growing and ever-more-sophisticated threat. The Security Pro's Guide to Tablet PCs - Sponsored by Absolute As businesses rely increasingly on tablets for the productivity benefits they provide, IT must address the security challenges the devices present. Here's a look at how to build a comprehensive tablet security strategy. Applications Monitoring For Security Professionals - Sponsored by IBM When it comes to monitoring, the application space is often forgotten. This leaves a gaping hole because the behavior of applications can reveal a great deal about security events and their causes. In this report, we make the case for the development of an applications monitoring strategy and provide recommendations for implementation that tap into existing products and processes. IT AS A SERVICE Beyond IT Service Management - Sponsored by FrontRange There are two ways to look at an IT as a service model: as a well-intentioned but jargon- and bureaucracy-filled worldview or as a fully integrated, engaged and involved part of the company's operations. You can guess which one we recommend, and it seems the 409 respondents to our InformationWeek 2013 Service-Oriented IT Survey agree. DIGITAL ISSUES [BIG DATA] Blinded By Big Data - Sponsored by IBM Making decisions based on flashy macro trends while ignoring "little data" fundamentals is a recipe for failure. [CLOUD COMPUTING ] Cloud Software: Where Next? -Sponsored by dtSearch & kony Want to relegate cloud software to edge apps or smaller businesses? No way. Read InformationWeek's August special issue on cloud's changing role in enterprise applications. [GOVERNEMENT] Tech Priorities - Sponsored by Affigent, DLT Solutions & Thawte Bold visions are competing with practical budget realities for federal IT leaders. Our latest annual survey looks at the top IT priorities. [SECURITY ] The Changing Face Of APTs - Sponsored by NeuStar Advanced persistent threats are evolving in motivation, malice and sophistication. Are you ready to stop the madness? InformationWeek Reports is brought to you by Absolute, FrontRange, HP, IBM, Trusteer, Vormetric and UBM Tech. You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter. If you received this newsletter from a friend and want to join. Read about and join other InformationWeek Newsletters here. UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy
| |
No comments:
Post a Comment