REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
Building a Security Analytics Initiative

Building a Security Analytics Initiative

To identify sophisticated attacks, infosec teams must correlate a huge range of data — from internal systems, threat intelligence services, cloud and network service providers, digital forensics and attribution services, and others. One way to cope: big data tools and practices.

Threat Intelligence Today

Threat Intelligence Today

Is threat intel the best way to stay ahead of new and complex attacks? The 397 respondents to our new survey seem to think so: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.

2014 US IT Salary Survey: Government

2014 US IT Salary Survey: Government

A three-year freeze on federal salaries has exacted a toll on federal IT pros: While 53% of managers and 56% of staffers say they received a raise in the past year, more than one-quarter say they had fewer training opportunities, and roughly 20% had their benefits cut, resulting in another year of declining job satisfaction.

2014 US IT Salary Survey: App Dev

2014 US IT Salary Survey: App Dev

Base salaries are up for the 2,006 app dev pros in our survey, for the third year in a row. For 86% of managers, aligning business and technology goals is just as critical as coding, and 66% of staffers got a raise in the past 12 months. However, the gender gap is wide, youth is valued, and outsourcing remains a sore point.

6 Tools to Protect Big Data

6 Tools to Protect Big Data

Most IT teams have their conventional databases covered in terms of security and business continuity. But as we enter the era of big data, Hadoop, and NoSQL, protection schemes need to evolve. In fact, big data could drive the next big security strategy shift.