REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
Mobile Security: All About the Data

Mobile Security: All About the Data

Our 2014 survey shows less focus on hardware, more on securing the information residing on devices - a strategy that makes data classification a cornerstone of mobile security. In this report, we'll zero in on how government IT pros manage mobility.

Research: Google in the Enterprise Survey

Research: Google in the Enterprise Survey

There's no doubt Google has made headway into businesses: Just 28% discourage or ban use of its productivity ­products, and 69% cite Google Apps' good or excellent ­mobility. But progress could still stall: 59% of nonusers ­distrust the security of its cloud, data privacy is an open question and 37% worry about integration.

Using Risk Assessment to Prioritize Security Tasks and Processes

Using Risk Assessment to Prioritize Security Tasks and Processes

The complexity of enterprise IT systems and processes is growing, as are threats against organizations’ assets. Unfortunately, security budgets are not. Security pros must therefore play a high-stakes game of figuring out which problems to tackle and in what order. In this Dark Reading report, we explain how risk assessment techniques can inform the process of ­prioritizing security tasks and processes, and recommend steps security pros can take to glean and apply pertinent data based on their own ­enterprise’s risk profile. 

Strategy: Understanding Severity and Criticality in Threat Reporting

Strategy: Understanding Severity and Criticality in Threat Reporting

With the rapid-fire disclosure of new threats and vulnerabilities we are ­seeing these days, it can be especially challenging for security pros to ­effectively determine the level of risk each poses to their companies. There are many matrixes and calculators that can help, but they may not reflect an organization’s specific needs. This Dark Reading report examines the vulnerability disclosure process and recommends ways in which security pros can interpret risk and plan mitigation and follow-up. 

Strategy: Creating and Maintaining A Custom Threat Profile

Strategy: Creating and Maintaining A Custom Threat Profile

Intelligence feeds provide organizations with a wealth of data about ­security threats, but the information is valuable only if it is relevant and ­actionable. To be effective, intelligence data must be parsed and prioritized based on your company’s specific IT systems and industry. In this Dark ­Reading report, we examine the types of information threat intelligence feeds can offer and recommend ways in which companies can most ­effectively develop a threat profile that will help keep their systems, data and customers more secure.

Strategy: Monitoring Security in Cloud Environments

Strategy: Monitoring Security in Cloud Environments

The use of cloud technology is booming, often offering the only way to meet customers', employees' and partners' rapidly rising requirements. But IT pros are rightly nervous about a lack of visibility into the security of data in the cloud. In this Dark Reading report, we put the risk in context and offer recommendations for products and practices that can increase insight - and enterprise security.