REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
Mobile Security: All About the Data

Mobile Security: All About the Data

Our 2014 survey shows less focus on hardware, more on securing the information residing on devices - a strategy that makes data classification a cornerstone of mobile security. In this report, we'll zero in on how government IT pros manage mobility.

Advanced Attacks Demand New Defenses

Advanced Attacks Demand New Defenses

Cyber-criminals wielding APTs have plenty of innovative techniques to evade network and endpoint defenses. It’s scary stuff, and ­ignorance is definitely not bliss. How to fight back? Think security that’s distributed, stratified, and adaptive. 

Research: 2014 Digital Business Survey

Research: 2014 Digital Business Survey

We broke our 510 respondents down by company size, and the differences are telling: 62% of smaller shops have ­digital strategies vs. 73% of large companies, and 28% of small orgs say IT is the primary driver of their digital strategies; that’s true of 38% of large shops.

How to Hire an MSSP

How to Hire an MSSP

Considering trusting a managed security services provider to be ­vigilant about your company’s well-being? Here’s how to successfully evaluate, select, and manage a hired security gun.