Issue highlights 1. 7 ideas for security leaders 2. IDG Contributor Network: Building balanced security support 3. Breaches are a personal nightmare for corporate security pros 4. Endpoint security trends for 2015: What can we expect? 5. Twenty-eight percent of security spending wasted on shelfware 6. DDOS attack size up 50-fold over past decade |
Resource compliments of: Akamai Technologies, Inc. Akamai's Prolexic Security and Engineering Research Team (PLXsert) is analyzing DDoS attacks from October to December. Among the news in the Q4 2014 State of the Internet - Security Report will be DDoS trends and details of a TCP Flag attack from a group claiming to be Lizard Squad, plus a new botnet profiling technique and spider mitigation tips. Pre-register now, you will receive a link to the free report as soon as it is released. |
Seven inspiring ideas for small changes that lead to big improvements in both security posture and leadership in the next few weeks. READ MORE |
A CISO shares some thoughts on maturing support for a security program. Moving away from incident focused urgent fixes to a more sustainable program based on helping stakeholders deliver their projects securely. READ MORE |
: Venafi When it comes to protecting mobile certificates, IT security leaders must act responsibly - with next-generation trust protection. Find out how Forrester rates IT security leaders' knowledge and understanding of keys and certificate technologies for mobile. Learn More |
Beyond the compromise of valuable information, loss of revenues and damage to brand reputation, data breaches can pose a threat to the careers of security professionals involved: witness the sudden departures of both the CEO and the CIO of Target after last year's compromise of 40 million customers' credit cards. READ MORE |
In my data center work experience, a very significant percentage of the major network vulnerabilites I've had to fix were caused by the introduction of poorly secured computers. It's a surprisingly common blunder. READ MORE |
White Paper: Box Today's most productive employees are not tied to a desk. These top producers are experts at finding new ways to integrate mobile devices into their daily workflow. Your challenge is to build an IT strategy and architecture that can support this new way of working with easy, reliable, 24/7 access to information, from anywhere in the world. Learn more! |
The average organization spent $115 per user on security-related software last year, but $33 of it, or 28 percent, was underutilized or not used at all, according to a new report from Osterman Research READ MORE |
The size of the largest DDOS attack was fifty times larger last year than ten years ago, according to a new survey of Internet service and hosting providers, and attacks are also increasing in numbers and in sophistication READ MORE |
White Paper: xMatters Read The 2015 IT Communications Buyers Guide and learn why you cannot afford to settle for a non-proven IT communications solution. This report details exactly what to look for, and also look out for, in an enterprise-grade vendor. Learn More |
|
0 comments:
Post a Comment