Fahmida Y. Rashid, May 22, 2013
It seems as though not a day goes by without a headline screaming that some organization has experienced a data breach, putting the business — and its customers and partners — at risk. To keep your own organization out of the news, it’s important to understand the most common causes of data breaches and what you can do to mitigate the threats they present.
| Read Report » | 2 MB
Fahmida Y. Rashid, Apr 26, 2013
When it comes to mobile security, some concerns are common across all organizations. One of the biggest is the surge in the use of personal devices for business purposes — otherwise known as BYOD. However, the challenges for SMBs are heightened because these organizations often lack resources and expertise. In this Dark Reading report, we examine mobile security risks that are unique to SMBs and provide recommendations for tackling the problems.
Fahmida Y. Rashid, Apr 11, 2013
Security is a big issue, especially for small and midsize businesses, and it often makes sense for resource-constrained SMBs to look outside their own IT ranks for support. In this Dark Reading report, we examine the types of outsourced services available and provide advice to SMBs about evaluating their own needs and readiness to establish partnerships with third-party security providers. We also recommend ways to leverage existing products and services so that security budgets can be more effectively allocated.
Fahmida Y. Rashid, Nov 8, 2012
Antivirus systems alone cannot fight a growing category of malware whose strength lies in the fact that we have never seen it before. Dark Reading examines the ways in which zero-day malware is being developed and spread, and the strategies and products enterprises can leverage to battle it.
Fahmida Y. Rashid, Jul 26, 2012
Intellectual property can be many things, but the key to keeping your organization’s IP safe is knowing what you have and how much it would cost if the data were lost or stolen. In this report, we recommend the steps companies should take to ensure that their IP is locked down and stays locked down.
Fahmida Y. Rashid, Jun 26, 2012
Smart companies treat compliance auditors not as the enemy but as a knowledgeable resource. In this report, we examine the role of compliance auditors and recommend how to work together to achieve a successful audit.