Adam Ely, Mar 16, 2012
IP acquisitions are increasing--companies have cash to spend, and technology is the cornerstone of growth. But mergers and acquisitions inevitably bring risk. For CISOs, thinking through the acquisition process and integration points before anyone signs on the dotted line will save time, money and maybe your job.
| Read Report » | 1 MB
Adam Ely, Jan 29, 2012
To protect company and customer data, we need to determine what makes it so vulnerable and appealing. We also need to understand how hackers operate, and what tools and processes they rely on. In this report, we explain how to ensure the best defense by thinking like an attacker and identifying the weakest link in your own corporate data chain.
| Read Report » | 816 KB
Adam Ely, Nov 29, 2011
Developing for tablets and smartphones? Here’s how to build safer software.
| Read Report » | 542 KB
Adam Ely, Sep 7, 2011
In our walled gardens, everything was good. But borders are eroding fast, and we must refocus our efforts on
protecting the data floating around in emails, spreadsheets, PDFs and documents, between staff, contractors, vendors and partners. There’s no perfect DRM solution, but IT can zero in on what features are the most important to your company based on risk and solve for that. Here’s how.
| Read Report » | 511 KB
Adam Ely, Aug 1, 2011
Redmond still rules when it comes to Web browsers for Windows 7. But IE 9’s reliance on Win 7 leaves room for rivals to gain ground in mixed OS environments. Read our assessment of IE 9 deployment, security and management features for business.
| Read Report » | 551 KB
Adam Ely, Jun 29, 2011
Companies are rushing headlong to develop applications for mobile customers who frequent app stores for Android, Apple and BlackBerry devices. But amid the flurry, IT must maintain its secure software development lifecycle process, including client-side, transport and web application security strategies, or risk a black eye.
| Read Report » | 465 KB
Adam Ely, Apr 17, 2011
It's 10 a.m. Do you know where your data is? Before you answer, take a look at our intrusion timeline.
| Read Report » | 447 KB
Adam Ely, Mar 8, 2011
To keep your off-site data safe, don't let vendors dodge the hard questions.
| Read Report » | 198 KB
Adam Ely, Dec 17, 2010
SSL is widely deployed, yet enterprises still struggle to manage it and ensure its effectiveness. Companies must understand the threats, know how to use SSL internally, and assure it functions properly and protects their data. In this report, we show you how to address the security and operational issues inherent in creating and managing internal SSL certificate authorities.
| Read Report » | 1 MB
Adam Ely, Sep 24, 2010
What does a + b + g + n equal? If you're not careful, a Wi-Fi mess. Here are 10 potentially critical errors--and how to avoid them.
| Read Report » | 98 KB