
ANALYTIC REPORTS & WHITEPAPERS
|
FEATURED REPORTS
Data-Centric Security
In this exclusive report, we explore the link between adoption of DLP and data-centric security and reveal what other technology is just as important, detail best practices to become more focused on data, and discuss when IT can help most by keeping its hands off. Download Now (Registration Required)
|
|
Integrity Check: 5 Steps to Data-Centric CyberSecurity
It's becoming more challenging to protect sensitive data and systems, and agencies that outsource major applications to the private sector are further abstracting system boundary and perimeter concepts. The answer is a shift in thinking away from yesterday's security approaches and toward data-centric protection via technologies like encryption, data loss prevention, and strong access controls. Download Now (Registration Required)
|
|
|
 |
 |
 |
|
FEATURED BLOG

Android Still At Risk From Fragmentation
Posted By Ed Hansberry
Recently Google announced that it will upgrade all US users to Android 2.1. Devices are currently shipping with four versions, so moving to one will help, but that may not be enough to save the platform from fragmentation.
ALSO SEE
Putting Verizon's LTE Speed Claims Into Perspective
Posted by Eric Zeman
This morning Verizon Wireless issued a press release noting that its trials of Long Term Evolution were producing data speeds much faster than expected. How does that really compare to what's available today?
Feds Still Seeking 'Meaningful' Feedback
Posted By Marianne Kolbasuk McGee
Want to weigh in the federal government's proposed meaningful use criteria before it's written in stone? Act soon. There's only about a week left to submit your comments to the feds.
iPad: The Ad, Tethering, What We Don't Know
Posted By Eric Zeman
Despite its flashy debut in January and the recent television spot that aired during the Oscars, there's still a lot we don't know about the Apple iPad. Steve Jobs did, however, take the time to respond directly to one user email about tethering the iPad to the iPhone.
Funeral For A Fiend
Posted By Dave Methvin
Most web designers and users despise Internet Explorer 6, especially now that it has been hanging on for nearly a decade. So there weren't a lot of tears shed at the recent funeral for IE6. But is it really dead, or will it live on in a zombie-like existence?
Spoofing Server-to-Server Communication: How You Can Prevent It
Learn how to prevent the new attack -- SSLStrip -- that exploits weaknesses of generic SSL to compromise server-server communication. You will learn valuable lessons from our presenter, Security Analyst, Larry Seltzer, about how you can prevent high-profile compromises of enterprise networks and breaches of data security.
It happens March 11, 2010 at 10:00 AM PT / 1:00 PM ET
More Information & Registration
|
 |

|
|