REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
Mobile Security: All About the Data

Mobile Security: All About the Data

Our 2014 survey shows less focus on hardware, more on securing the information residing on devices - a strategy that makes data classification a cornerstone of mobile security. In this report, we'll zero in on how government IT pros manage mobility.

The Agile Archive

The Agile Archive

When it comes to managing data, don’t look at backup and archiving systems as burdens and cost centers. A well-designed archive can enhance data protection and restores, ease search and e-discovery efforts, and save money by intelligently moving data from expensive primary storage systems.

Strategy: Understanding Severity and Criticality in Threat Reporting

Strategy: Understanding Severity and Criticality in Threat Reporting

With the rapid-fire disclosure of new threats and vulnerabilities we are ­seeing these days, it can be especially challenging for security pros to ­effectively determine the level of risk each poses to their companies. There are many matrixes and calculators that can help, but they may not reflect an organization’s specific needs. This Dark Reading report examines the vulnerability disclosure process and recommends ways in which security pros can interpret risk and plan mitigation and follow-up. 

Strategy: Creating and Maintaining A Custom Threat Profile

Strategy: Creating and Maintaining A Custom Threat Profile

Intelligence feeds provide organizations with a wealth of data about ­security threats, but the information is valuable only if it is relevant and ­actionable. To be effective, intelligence data must be parsed and prioritized based on your company’s specific IT systems and industry. In this Dark ­Reading report, we examine the types of information threat intelligence feeds can offer and recommend ways in which companies can most ­effectively develop a threat profile that will help keep their systems, data and customers more secure.

Strategy: Monitoring Security in Cloud Environments

Strategy: Monitoring Security in Cloud Environments

The use of cloud technology is booming, often offering the only way to meet customers', employees' and partners' rapidly rising requirements. But IT pros are rightly nervous about a lack of visibility into the security of data in the cloud. In this Dark Reading report, we put the risk in context and offer recommendations for products and practices that can increase insight - and enterprise security.

Strategy: Identifying and Discouraging Determined Hackers

Strategy: Identifying and Discouraging Determined Hackers

You've done all the right things to defend your organization against ­cybercrime. Is it time to go on the offensive? Active response must be ­carefully thought through and even more carefully conducted. This Dark Reading report examines the rising interest in active response and recommends ways to determine whether it's right for your organization.

Strategy: Anatomy of a SQL Injection Attack

Strategy: Anatomy of a SQL Injection Attack

SQL injection is the attack method that just won’t go away. For 15 years it has been wreaking havoc on the enterprise. Does that mean SQL injection attacks are unstoppable? Hardly. Rather, it means we have a history of ­experience to draw — and learn — from. In this Dark Reading report, we ­examine the ways in which SQL injection attacks are perpetrated and what you can do to ensure that your organization does not fall prey.

SDN: Physical vs. Logical

SDN: Physical vs. Logical

Until recently, most software-defined networking buzz has centered on hardware — decoupling the control logic and switching fabric in switches and routers using OpenFlow. But that’s only half (and maybe the less ­important half) of the story. Virtual servers need virtual networks that can be managed independently of the underlying physical plumbing.