REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
Building a Security Analytics Initiative

Building a Security Analytics Initiative

To identify sophisticated attacks, infosec teams must correlate a huge range of data — from internal systems, threat intelligence services, cloud and network service providers, digital forensics and attribution services, and others. One way to cope: big data tools and practices.

Threat Intelligence Today

Threat Intelligence Today

Is threat intel the best way to stay ahead of new and complex attacks? The 397 respondents to our new survey seem to think so: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.

DevOps Impact on Application Security

DevOps Impact on Application Security

Managing the interdependency between software and ­infrastructure is a thorny challenge. Often, it’s a “developers are from Mars, systems engineers are from Venus” situation. Enter DevOps, a methodology aimed at increasing collaboration and communication between these groups while minimizing code flaws. Should security teams worry — or rejoice?

2014 US IT Salary Survey: Healthcare

2014 US IT Salary Survey: Healthcare

IT compensation in healthcare tends to be 2% to 3% lower than the median for all industries, although the median compensation for healthcare CIOs is actually 7% higher. Workers say their pay is not increasing as fast as the work they must do to meet regulatory demands.

2014 US IT Salary Survey: Networking

2014 US IT Salary Survey: Networking

Salaries in US datacenters and network facilities for 2014 continue their anemic growth pattern, with base salaries essentially flat. But when you factor in actual declines in pay for women and the cost of IT training, the gap between gainers and losers may be widening.