REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
SaaS as Innovation Driver

SaaS as Innovation Driver

If you think of software-as-a-service as just a way to outsource CRM or HR systems, you're being too tactical. Our new survey shows IT's ready to focus more on business innovation, less on infrastructure operations. Here's how to make that happen.

Strategy: Creating and Maintaining A Custom Threat Profile

Strategy: Creating and Maintaining A Custom Threat Profile

Intelligence feeds provide organizations with a wealth of data about ­security threats, but the information is valuable only if it is relevant and ­actionable. To be effective, intelligence data must be parsed and prioritized based on your company’s specific IT systems and industry. In this Dark ­Reading report, we examine the types of information threat intelligence feeds can offer and recommend ways in which companies can most ­effectively develop a threat profile that will help keep their systems, data and customers more secure.

Strategy: Monitoring Security in Cloud Environments

Strategy: Monitoring Security in Cloud Environments

The use of cloud technology is booming, often offering the only way to meet customers', employees' and partners' rapidly rising requirements. But IT pros are rightly nervous about a lack of visibility into the security of data in the cloud. In this Dark Reading report, we put the risk in context and offer recommendations for products and practices that can increase insight - and enterprise security.

Strategy: Anatomy of a SQL Injection Attack

Strategy: Anatomy of a SQL Injection Attack

SQL injection is the attack method that just won’t go away. For 15 years it has been wreaking havoc on the enterprise. Does that mean SQL injection attacks are unstoppable? Hardly. Rather, it means we have a history of ­experience to draw — and learn — from. In this Dark Reading report, we ­examine the ways in which SQL injection attacks are perpetrated and what you can do to ensure that your organization does not fall prey.

SDN: Physical vs. Logical

SDN: Physical vs. Logical

Until recently, most software-defined networking buzz has centered on hardware — decoupling the control logic and switching fabric in switches and routers using OpenFlow. But that’s only half (and maybe the less ­important half) of the story. Virtual servers need virtual networks that can be managed independently of the underlying physical plumbing. 

Strategy: Choosing, Managing and Evaluating A Penetration Testing Service

Strategy: Choosing, Managing and Evaluating A Penetration Testing Service

Pen testing helps companies become more secure by finding and ­analyzing their insecurities, but pen test services can be fraught with their own kind of risk. In this Dark Reading report, we recommend what to look for in a provider and its wares, how to get what you pay for, and how to ensure that pen testing itself doesn’t open the ­company or its employees up to new risk.