SECURITY Online Security: What Every End User Should Know Sponsored by Symantec A company's security is only as strong as its weakest link, and all too often the weakest link is a company's end users. It has always been a challenge to get users to understand the importance of security compliance, but it's become more challenging with the blurring lines between home and corporate -technology use. In this Dark Reading report, we suggest a process for educating users about online threats and protections - and in the process getting them more engaged in and committed to corporate security. How Attackers Target & Exploit Critical Business Apps Sponsored by Imperva Attackers are increasingly targeting business applications such as ERP and CRM, but IT departments are loath to do much more than the basics to secure them because of fear of downtime. It's no longer enough to rely on the applications' complexity and relative isolation for protection. This Dark Reading report examines the risks associated with critical enterprise applications, the challenges of securing them and the steps that enterprise IT pros can take to layer on protections. Choosing and Implementing an Enterprise Database Encryption Strategy Sponsored by IBM Unless there is absolutely nothing of value in your organization's databases, you should be implementing data encryption. This Dark Reading report examines the different options available, as well as alternatives for those situations when encryption is not an option. The Risky Business of Managing Risk Sponsored by IBM Metrics, data classification, governance, compliance - and your vendors - are all part of the risk management equation. Security Pro's Guide to Tablet PCs - Sponsored by Absolute As businesses rely increasingly on tablets for the productivity benefits they provide, IT must address the security challenges the devices present. Here's a look at how to build a comprehensive tablet security strategy.
BIG DATA How Enterprises Can Use Big Data to Improve Security - Sponsored by IBM There's a lot of confusion about what big data really is and what role it can-and should-play in security. In this Dark Reading report, we examine how big data can be used to complement existing security efforts, how big data and SIEM are alike and different, and what companies need to do to get ready for the big data security shift.
InformationWeek Reports is brought to you by Absolute, Asigra, FrontRange, IBM, Imperva, Symantec, Wind River and UBM Tech. You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter. If you received this newsletter from a friend and want to join. Read about and join other InformationWeek Newsletters here. UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy
| |
No comments:
Post a Comment