RSA Conference 2012
The RSA conference brings together security experts, vendors, and IT leaders to debate the thorniest issues in information security. Our InformationWeek editorial team will be there to provide you with up-to-the minute news, analysis, and commentary. Our special coverage will also round up stories from our sister publication, Dark Reading.
InformationWeek 2013 Strategic Security Survey
This survey will take approximately 15 minutes to complete. Your responses will be kept confidential and used in aggregate only. Nothing will be attributed to you or to your organization. The results will appear in an upcoming issue of InformationWeek as well as in an in-depth report. Upon completing the survey, you will be eligible to enter a drawing to receive one Apple 64 GB iPad with retina display and Wi-Fi + cellular valued at $829 from UBM Tech. This survey sweepstakes is not sponsored, endorsed or administered by Apple. You will also receive a special priority code enabling you to save an additional $200 off the early bird discount on All Access and Conference Passes to attend Interop Las Vegas, May 6-10. The code is valid through March 22.
Research: State of the IT Service Desk
Infrastructure changes, customer satisfaction, process improvement, service-level achievement, performance management, cost reduction, security… Historically, these topics have dominated IT support managers’ day-to-day routines. Traditional IT service and technical support responsibilities and methodologies are on the edge of obsolescence.
Will IPv6 Make Us Unsafe?
We see security as a major stumbling block in enterprise migrations from IPv4 to IPv6. For starters, the code is mostly untested, and too few of our current network security products support IPv6, something the black hat community is banking on.
Data breaches cost U.S. companies $214 per compromised customer record last year, according to the Ponemon Institute. The average total per-incident cost in 2010 was $7.2 million. Beyond the tangible costs, brand damage can be significant as well, though it is hard to quantify.
Strategy: Heading Off Advanced Social Engineering Attacks
Social engineering attacks are getting increasingly sophisticated, but there's only so much the law and technology can do to protect your organization. In this Dark Reading report, we detail how a social engineering attack is developed and what IT professionals can do to prevent their users from being targets and victims.