REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
Strategy: Identifying and Discouraging Determined Hackers

Strategy: Identifying and Discouraging Determined Hackers

You've done all the right things to defend your organization against ­cybercrime. Is it time to go on the offensive? Active response must be ­carefully thought through and even more carefully conducted. This Dark Reading report examines the rising interest in active response and recommends ways to determine whether it's right for your organization.

2014 US IT Salary Survey: App Dev

2014 US IT Salary Survey: App Dev

Base salaries are up for the 2,006 app dev pros in our survey, for the third year in a row. For 86% of managers, aligning business and technology goals is just as critical as coding, and 66% of staffers got a raise in the past 12 months. However, the gender gap is wide, youth is valued, and outsourcing remains a sore point.

6 Tools to Protect Big Data

6 Tools to Protect Big Data

Most IT teams have their conventional databases covered in terms of security and business continuity. But as we enter the era of big data, Hadoop, and NoSQL, protection schemes need to evolve. In fact, big data could drive the next big security strategy shift.