REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
Threat Intelligence Today

Threat Intelligence Today

Is threat intel the best way to stay ahead of new and complex attacks? The 397 respondents to our new survey seem to think so: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.

Mobile Security: All About the Data

Mobile Security: All About the Data

Our 2014 survey shows less focus on hardware, more on securing the information residing on devices - a strategy that makes data classification a cornerstone of mobile security. In this report, we'll zero in on how government IT pros manage mobility.

2014 US IT Salary Survey: Networking

2014 US IT Salary Survey: Networking

Salaries in US datacenters and network facilities for 2014 continue their anemic growth pattern, with base salaries essentially flat. But when you factor in actual declines in pay for women and the cost of IT training, the gap between gainers and losers may be widening.

2014 US IT Salary Survey: Government

2014 US IT Salary Survey: Government

A three-year freeze on federal salaries has exacted a toll on federal IT pros: While 53% of managers and 56% of staffers say they received a raise in the past year, more than one-quarter say they had fewer training opportunities, and roughly 20% had their benefits cut, resulting in another year of declining job satisfaction.

2014 US IT Salary Survey: App Dev

2014 US IT Salary Survey: App Dev

Base salaries are up for the 2,006 app dev pros in our survey, for the third year in a row. For 86% of managers, aligning business and technology goals is just as critical as coding, and 66% of staffers got a raise in the past 12 months. However, the gender gap is wide, youth is valued, and outsourcing remains a sore point.

6 Tools to Protect Big Data

6 Tools to Protect Big Data

Most IT teams have their conventional databases covered in terms of security and business continuity. But as we enter the era of big data, Hadoop, and NoSQL, protection schemes need to evolve. In fact, big data could drive the next big security strategy shift.