Friday, September 28, 2012

=?iso-8859-1?Q?Friday Roundup: Intellectual Property Theft=2C Measuring Real Risk=2C Security=2C Patch Management Best Practices=2C and Overcoming the Challenges.?=

This message is brought to you as a valued IDG Connect subscriber.

Intellectual Property Theft, Measuring Real Risk, Security, Management Best Practices, and Overcoming the Challenges.


Unsubscribe

Welcome to the VoicesOn Friday Roundup. This week, we bring you white papers on Intellectual Property Theft, Measuring Real Risk, Security, Patch Management Best Practices, and Overcoming the Challenges.

Indicators of Intellectual Property Theft
New research from Symantec reveals the psychology behind intellectual property theft by corporate insiders. The report addresses the high level of organizational anxiety surrounding potential theft of sensitive, proprietary, intellectual property or similar critical data by employees. It describes what is known about the people and organizational conditions which contribute to this risk.
The research paper was authored by Dr. Harley Stock and Dr. Eric Shaw, experts in the fields of psychological profiling and employee risk management. Based on empirical research, Dr. Stock and Dr.Shaw have identified the key behaviors and indicators that contribute to intellectual property theft by malicious insiders. The report also features practical recommendations for organizations that are concerned with intellectual theft risk.

Leveraging Security Risk Intelligence: The Strategic Value of Measuring Real Risk
Every IT security professional knows that the battle to protect IT resources and data is fully engaged. In its 2012 Data Breach Investigations Report, Verizon registered 174 million compromised records for 2011, compared with 4 million compromised records reported in the 2010 findings. This suggests that cybercriminals - responsible in 98% of the cases - continued to automate and refine their attack methods.
The ongoing struggle to prevent hackers from breaching assets and malware from gaining a foothold requires a vulnerability management strategy that begins with a comprehensive measurement of security risk. Organizations must examine the entire IT stack, including the operating system, network, applications, and databases. The cycle of discovering assets, capturing and processing vulnerability data, identifying actual risks, testing and prioritizing mitigation tasks, and verifying effective controls grows more complex with every new technology that adds convenience but multiplies risk of a breach or incident. These new technologies include dynamic, virtualized environments and services outside traditional physical IT infrastructures, such as virtualized, cloud-based services and social networking.

Five Ways to Improve Your Employees' Security While They Surf the Web
A typical 1,000 employee company spends over $287,000 per year defending against and cleaning up after malware attacks. In these tough economic times, anything you can do to drive down that cost means more precious resources to invest elsewhere. In this educational webinar, we'll describe five proven strategies companies can use to improve their web security program's effectiveness so that you can do more with less.

Lumension Guide to Patch Management Best Practices
With the sophistication and sheer volume of exploits targeting major applications and operating systems, the speed of assessment and deployment of security patches across your complex IT infrastructure is key to mitigating risks and remediating vulnerabilities. Here are the Lumension-recommended steps to cure your patch management headache.

Overcoming the Challenges of Mobile Video Conferencing
The value of video conferencing is well understood: a recent Frost & Sullivan survey of more than 200 C-level executives shows that the technology is in use in 51 percent of organizations, and is personally used by 41 percent of respondents. The primary driver is cost reduction, although video conferencing is also valued for its ability to improve productivity and collaboration across geographically dispersed teams, and for improving customer service.
Video conferencing also meets or exceeds more than 90 percent of users' expectations, which explains why almost half of them plan to expand their usage in the next 12 months. Frost & Sullivan believes that much of that expansion will come in the form of mobile video solutions, which enable usage across an organization, opening up the technology to every employee who needs it, regardless of where he is located or what type of network or device he is using.
This paper examines the move toward mobile video conferencing, discuss the limitations of traditional video conferencing technology when it comes to supporting mobile users, highlight the issues IT managers must consider as they look to deploy a new system, and present one vendor's solution to the challenges, enabling better performance and a much higher ROI.

 

Thank you,
VoicesOn

________________________________________________________________________
Forward this to a Friend >>>
__________________________________________________________________________
To unsubscribe from future Voiceson emails, please click here.

View our Privacy Policy.

You are receiving this email from IDG as a subscriber to one of the IDG brands:
CIO | Computerworld | CSO | GamePro | Games.net | Industry Standard | Infoworld | ITworld | JavaWorld | LinuxWorld | Macworld | Network World | DEMO | IDG Connect | IDG Knowledge Hub | IDG Tech Network | IDG World Expo

Copyright 2012 | VoicesOn - IDG Connect, 492 Old Connecticut Path, Framingham, MA 01701. http://www.voiceson.com

ads

Ditulis Oleh : Angelisa Vivian Hari: 9:07 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive