Security

Outrunning the Bear: 5 critical ways to take a more collaborative approach to IT security A white paper by HP and CIO Marketing Services

Outrunning the Bear: 5 critical ways to take a more collaborative approach to IT security A white paper by HP and CIO Marketing Services

Studies show the average time to resolve a security breach once detected is more than 45 days, and companies lose…

Read More
Breach Response: How to Prepare for the Inevitable A white paper by IDG and HP

Breach Response: How to Prepare for the Inevitable A white paper by IDG and HP

To avoid being breached, you have to get it right every single time. To breach you, hackers only have to…

Read More
2014 Cost of Cyber Crime Study: Global

2014 Cost of Cyber Crime Study: Global

Ponemon Institute has completed its fifth year studying the cost of cyber crime to businesses around the world. The 2014…

Read More
State of security operations 2014 report of capabilities and maturity of cyber defense organizations

State of security operations 2014 report of capabilities and maturity of cyber defense organizations

As the incidence and cost of cyber crime have escalated, organizations have responded by establishing security operations centers (SOC) to…

Read More
Network World QuickPulse: SECURITY

Network World QuickPulse: SECURITY

A new survey from IDG Research Services tells the story: most organizations lack confidence in the ability of their security…

Read More
Cyber Risk Report

Cyber Risk Report

Today's cyber world is an evolving landscape of known vulnerabilities and exploits coupled with new threats brought by new technologies.…

Read More
Think like a Bad Guy: Understanding Advanced Threats and How to Mitigate Them

Think like a Bad Guy: Understanding Advanced Threats and How to Mitigate Them

When you're a hacker, time is on your side. Time to find a soft spot in your armor, to evade defenses,…

Read More
Box and Office 365 – Four Reasons Why Companies Use Both

Box and Office 365 – Four Reasons Why Companies Use Both

Today's IT organizations are asked to meet two often opposing requirements — providing employees with the software they want to…

Read More
Think like a Bad Guy: Understanding Advanced Threats and How to Mitigate Them

Think like a Bad Guy: Understanding Advanced Threats and How to Mitigate Them

When you're a hacker, time is on your side. Time to find a soft spot in your armor, to evade defenses,…

Read More
1 6 7 8 9 10 16
Tracking Pixel