Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Search Results:

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:










Research Report: 10 Cyber Threats Small Businesses Can't Ignore

by InformationWeekSep 18, 2012

The email came from "Ivan" in Russia: "After a few minutes I'll start a DDoS attack on your site, and it will cease to work," the message said. "If you don't want to lose any profit, you pay me only $3,500."Endless Wardrobe, the Australian online clothing retailer under attack, refused to pay. As threatened, the site was flooded with bogus information requests, overwhelmed, and down for a week. Endless Wardrobe worked with its hosting provider to blunt the attack, but the defenses erected by the


Research Report: 10 Emerging Threats Your Company May Not Know About

by InformationWeekMay 09, 2013

10 Emerging Threats Your Company May Not Know AboutIT pros have never been able to just sit back and relax when it comes to security, but today’s computing landscape is fraught with threats from places we never would have dreamed 10 or even five years ago. Social, ubiquitous mobile, the cloud, the consumerization of IT, cyber espionage … there is no end to the new and newly critical threats facing the enterprise.In this Dark Reading report, we examine 10 emerging threats that


Research Report: 10 Government Technology Innovators

by InformationWeekSep 25, 2009

IT professionals in government, as in all industries, are under pressure. Sure, resources are tight, and legacy IT systems and processes are the norm, but there’s also a growing expectation among the public that government agencies be more transparent and efficient and that their services be Web-enabled. What are government IT organizations to do?Many are getting creative in how they apply technology to meet their mandates. At the local, state, and federal levels, government technologists


Research Report: 10 Ideas To Power Up Your Green IT Agenda

by InformationWeekSep 22, 2008

As IT teams scramble to figure out a green strategy, here are some ideas to fuel the brainstorming


Research Report: 10 Key Steps to Success In Data Loss Prevention

by InformationWeekApr 11, 2013

10 Key Steps to Success In Data Loss Prevention  DLP, or data loss prevention, can be a monster to manage, especially on a large scale. Even for smaller organizations, it’s important to tread carefully and to break the project up into manageable chunks. Deploying DLP isn’t like deploying a security incident and event management system or a network management system, where you can just add hosts or log sources and get going. With DLP, you need to strategically position


Research Report: 10 Most Common Security Vulnerabilities in Enterprise Databases

by InformationWeekJun 24, 2013

10 Most Common Security Vulnerabilities in Enterprise Databases  Databases have a big target on their backs. Often the who are putting databases at risk are not malicious attackers but people within the organization— including database ­administrators and developers — who aren’t doing what they need to do to keep database systems secure.Vulnerabilities can be introduced during the creation of a database, in the process of customizing an off-the-shelf application or in


Research Report: 10 Recommendations for Outsourcing Security

by InformationWeekSep 23, 2014

Security isn't just an IT problem. Outsourcing is a bigger strategy for the organization -- and one that shouldn't be tackled by IT alone. Engage senior leaders in an in-depth security discussion; you'll get buy-in from the beginning and have some level of insurance should the deal go south. With the C-suite's stamp of approval, the next step is to determine exactly which elements of the infrastructure are appropriate to outsource and which type of security outsourcing is best for your


Research Report: 10 Steps to Ace a FISMA Audit

by InformationWeekMar 28, 2010

The Federal Information Security Management Act known as FISMA, is typically thought to apply only to government organizations. However, contractors and vendors that provide services to, manage systems on behalf of, or maintain close relationships with a government agency may be held to similar standards.That can be a problem because FISMA regulations are confusing at best and more commonly just plain overwhelming. Not surprisingly, a cottage industry has sprung up of expensive contractors who


Research Report: 10 Things to Consider When Developing BYOD Security Policy

by InformationWeekSep 09, 2013

10 Things to Consider When Developing BYOD Security PolicyThe bring-your-own-device — or BYOD — movement has opened up a new world of ­opportunities for companies and end users alike. For example, companies can reduce the costs associated with device procurement, and employees get to use their preferred devices and mobile operating systems. But with this opportunity comes a great deal of ­ambiguity, especially as related to security. The employee owns the device,


Research Report: 10 Urgent Tasks For Microsoft In 2009

by InformationWeekSep 15, 2009

Microsoft posted record revenue of $60 billion in 2008 and a hefty $17.5 billion profit. It's still the dominant player in most major software markets and its OS runs 9 out of 10 PCs. So things are rosy in Redmond, right?Wrong. The solid numbers belie serious cracks that are emerging in Microsoft's core franchises. Windows sales and market share, though robust, are in decline. The company's efforts to expand into new markets are floundering, and key executives are jumping ship. With that in