REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
Research: 2014 State of Server Technology

Research: 2014 State of Server Technology

Buying power and influence are rapidly shifting to service providers. Where does that leave enterprise IT? Not at the ­cutting edge, that’s for sure: Only 19% are increasing both the number and capability of servers, budgets are level or down for 60% and just 12% are using new micro technology. 

Strategy: Monitoring Security in Cloud Environments

Strategy: Monitoring Security in Cloud Environments

The use of cloud technology is booming, often offering the only way to meet customers', employees' and partners' rapidly rising requirements. But IT pros are rightly nervous about a lack of visibility into the security of data in the cloud. In this Dark Reading report, we put the risk in context and offer recommendations for products and practices that can increase insight - and enterprise security.

Strategy: Anatomy of a SQL Injection Attack

Strategy: Anatomy of a SQL Injection Attack

SQL injection is the attack method that just won’t go away. For 15 years it has been wreaking havoc on the enterprise. Does that mean SQL injection attacks are unstoppable? Hardly. Rather, it means we have a history of ­experience to draw — and learn — from. In this Dark Reading report, we ­examine the ways in which SQL injection attacks are perpetrated and what you can do to ensure that your organization does not fall prey.

SDN: Physical vs. Logical

SDN: Physical vs. Logical

Until recently, most software-defined networking buzz has centered on hardware — decoupling the control logic and switching fabric in switches and routers using OpenFlow. But that’s only half (and maybe the less ­important half) of the story. Virtual servers need virtual networks that can be managed independently of the underlying physical plumbing. 

Strategy: Choosing, Managing and Evaluating A Penetration Testing Service

Strategy: Choosing, Managing and Evaluating A Penetration Testing Service

Pen testing helps companies become more secure by finding and ­analyzing their insecurities, but pen test services can be fraught with their own kind of risk. In this Dark Reading report, we recommend what to look for in a provider and its wares, how to get what you pay for, and how to ensure that pen testing itself doesn’t open the ­company or its employees up to new risk.