6 Must Read Information Technology Security Reports
For those of you who would like to know more about the state of information and computer security – would do well to get informed by reading these reports. While some of you may feel that there is not a lot that you can do with this information, at the very least it will give you some idea of what is keeping up security professionals at night.
A very informative report for those who would like to better understand how data breaches occur, and what the emerging trends are likely to be in 2013. The report profiles over 47,000 reported incidents and 621 confirmed data breaches from 27 countries – making it one of the most comprehensive analyses available in the industry.
Almost every organization will use at least a few Microsoft products and many are highly dependent on them. This report talks in-depth about security vulnerabilities in Microsoft and other third-part products – and advises companies on how to combat these to reduce exposure. Microsoft also includes deep analysis of trends from more than 100 countries, while offering suggestions about how to manage these risks.
Another very informative report from one of the largest networking technology companies in the world. This report focuses on mobile threats and how the increasing threat of malware is changing the security landscape. Cisco also includes advice on how to better defend company networks, and how certain tradeoffs affect the balance of convenience versus security integrity.
(Requires Registration) – Another excellent report that sadly requires you to register before viewing. If you’re willing to put up with the slight inconvenience, this report offers a good hard look at identified security vulnerabilities, policy compliance issues, and how remediation efforts are affecting the security landscape. VeraCode also offers additional perspectives about known vulnerabilities found in certain programming languages.
This report from Sophos offer many similar insights as the other reports mentioned in this list, however they also offer some more information about how BYOD (Bring-Your-Own-Device) trends are affecting the continuing state of business and enterprise security. Another interesting insight discusses the strategic shift from device-orientated views towards user-centric views.
This report from Symantec provides an overview and analysis of the global threat activity in regards to internet security – including mobile, zero-day, spam, and the dramatic rise of targeted attacks. Symantec analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape – and highlight in particular how small businesses are becoming the juicier target for malicious attackers.
Enjoy reading and stay safe!