REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
Mobile Security: All About the Data

Mobile Security: All About the Data

Our 2014 survey shows less focus on hardware, more on securing the information residing on devices - a strategy that makes data classification a cornerstone of mobile security. In this report, we'll zero in on how government IT pros manage mobility.

Strategy: Protecting Your Enterprise From DNS Threats

Strategy: Protecting Your Enterprise From DNS Threats

DNS is the world’s largest distributed database, and it’s increasingly being used as a launchpad for attacks. To gird against this growing threat, enterprise security pros need to understand the dangers posed and the damage that can be done. In this Dark Reading report, we ­provide a detailed examination of the ever-looming DNS threat, as well as advice and recommended resources for protecting the enterprise against it.

Research: 2014 State of Server Technology

Research: 2014 State of Server Technology

Buying power and influence are rapidly shifting to service providers. Where does that leave enterprise IT? Not at the ­cutting edge, that’s for sure: Only 19% are increasing both the number and capability of servers, budgets are level or down for 60% and just 12% are using new micro technology. 

Research: Google in the Enterprise Survey

Research: Google in the Enterprise Survey

There's no doubt Google has made headway into businesses: Just 28% discourage or ban use of its productivity ­products, and 69% cite Google Apps' good or excellent ­mobility. But progress could still stall: 59% of nonusers ­distrust the security of its cloud, data privacy is an open question and 37% worry about integration.

Using Risk Assessment to Prioritize Security Tasks and Processes

Using Risk Assessment to Prioritize Security Tasks and Processes

The complexity of enterprise IT systems and processes is growing, as are threats against organizations’ assets. Unfortunately, security budgets are not. Security pros must therefore play a high-stakes game of figuring out which problems to tackle and in what order. In this Dark Reading report, we explain how risk assessment techniques can inform the process of ­prioritizing security tasks and processes, and recommend steps security pros can take to glean and apply pertinent data based on their own ­enterprise’s risk profile. 

Strategy: Understanding Severity and Criticality in Threat Reporting

Strategy: Understanding Severity and Criticality in Threat Reporting

With the rapid-fire disclosure of new threats and vulnerabilities we are ­seeing these days, it can be especially challenging for security pros to ­effectively determine the level of risk each poses to their companies. There are many matrixes and calculators that can help, but they may not reflect an organization’s specific needs. This Dark Reading report examines the vulnerability disclosure process and recommends ways in which security pros can interpret risk and plan mitigation and follow-up.