Michael A. Davis, Apr 25, 2011
Executives are paying attention to security—just like you always wanted. Survey respondents are seeing increased funding (albeit only slightly), and business leaders are getting involved in policy discussions. That’s good news for security pros, but it also puts us under greater scrutiny. Here’s how to flourish in this new environment.
Michael A. Davis, Mar 8, 2011
Spinning up VMs is easy--too easy, in fact. Fortunately, keeping virtual servers safe doesn't have to be.
| Read Report » | 599 KB
Michael A. Davis, Feb 18, 2011
Spinning up VMs may well be too easy for our own good. For example, our latest Virtualization Security Survey shows a lack of even basic change controls in many organizations. Fortunately, keeping virtual servers safe isn’t as difficult—or expensive—as some vendors would have you believe. We’ll explain our strategy.
Plus: VDI Security Strategy
| Read Report » | 1 MB
Michael A. Davis, Feb 15, 2011
Without a logical way to prioritize security spending, you may as well be flipping a coin. Yet we found that's exactly how some CISOs do business. Time to get rational.
| Read Report » | 379 KB
Michael A. Davis, Jan 12, 2011
By the seat of the pants is no way to prioritize security spending and set project precedence. But we found that’s exactly how some CISOs are doing business. This must change, and we’ll tell you why (and how).
| Read Report » | 624 KB
Michael A. Davis, Sep 30, 2010
Data-centric protection and increased vigilance of provider and partner networks is the new call to arms for WAN security professionals.
Michael A. Davis, Sep 24, 2010
In this report, we'll learn how an attacker scouts out and exploits your network, and some of the things you can do to thwart his designs and send him packing.
| Read Report » | 656 KB
Michael A. Davis, Jun 20, 2010
SMBs must prepare for the risks most real to them, not those facing larger companies.
| Read Report » | 3 MB
Michael A. Davis, May 26, 2010
We've weathered years of budget cuts. Could proof of a threat potent enough to drive Google out of China free up resources?
Michael A. Davis, May 7, 2010
We've weathered years of stagnant budgets and personnel cuts. Could proof of a massive, sophisticated network of organized attackers formidable enough to drive Google out of China finally open management's eyes to just what it will take to protect our data in the coming decade?
| Read Report » | 1 MB