REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
Threat Intelligence Today

Threat Intelligence Today

Is threat intel the best way to stay ahead of new and complex attacks? The 397 respondents to our new survey seem to think so: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.

Strategy: Identifying and Discouraging Determined Hackers

Strategy: Identifying and Discouraging Determined Hackers

You've done all the right things to defend your organization against ­cybercrime. Is it time to go on the offensive? Active response must be ­carefully thought through and even more carefully conducted. This Dark Reading report examines the rising interest in active response and recommends ways to determine whether it's right for your organization.

2014 US IT Salary Survey: Networking

2014 US IT Salary Survey: Networking

Salaries in US datacenters and network facilities for 2014 continue their anemic growth pattern, with base salaries essentially flat. But when you factor in actual declines in pay for women and the cost of IT training, the gap between gainers and losers may be widening.

2014 US IT Salary Survey: Government

2014 US IT Salary Survey: Government

A three-year freeze on federal salaries has exacted a toll on federal IT pros: While 53% of managers and 56% of staffers say they received a raise in the past year, more than one-quarter say they had fewer training opportunities, and roughly 20% had their benefits cut, resulting in another year of declining job satisfaction.

2014 US IT Salary Survey: App Dev

2014 US IT Salary Survey: App Dev

Base salaries are up for the 2,006 app dev pros in our survey, for the third year in a row. For 86% of managers, aligning business and technology goals is just as critical as coding, and 66% of staffers got a raise in the past 12 months. However, the gender gap is wide, youth is valued, and outsourcing remains a sore point.

6 Tools to Protect Big Data

6 Tools to Protect Big Data

Most IT teams have their conventional databases covered in terms of security and business continuity. But as we enter the era of big data, Hadoop, and NoSQL, protection schemes need to evolve. In fact, big data could drive the next big security strategy shift.