ETM e-books


description

In a growing number of organizations, sensitive data is being moved in and out of the business with little oversight. As employees turn to unsanctioned electronic means to exchange files, they’re getting their jobs done – but they’re also putting their organizations at risk. Imagine the repercussions of sensitive information falling into the hands of one of your competitors. Or consider the potential impact to your organization’s reputation – and balance sheet – if you violate a regulation. With data serving as the lifeblood of your business, you can’t afford to lose control of confidential information. This eBook shares research findings and insights into: Trends spurring risky data and file sharing Recommendations on how toprotect corporate data without impeding user productivity


description

More businesses than ever are confronting how to fully embrace mobile devices beyond their executive and sales teams. In a way, IT teams are being dragged into this. Many users have fully incorporated smartphones and tablets into their daily lives thanks to devices and operating systems from Apple and Google. They are choosing the personal user experience of Android and iPhone over the largely business-task-driven BlackBerry devices. They have also adopted application stores in their personal lives, blending activities like...


description

If you think about it, Web application security these days is a bit of a reverse lottery. There are millions of production Web applications out in the wild. And the vast majority are susceptible to some sort of vulnerability or another, be it SQL injection, cross site scripting or a simple information leak that can lead to further attack. Any given flawed application could remain open to attack but never experience exploitation for the entire life that it spends on the Internet. It could just fall off the bad guys’ radar. Or not. A flawed application could also have its number come up just a few weeks after it goes live, found out by a hacker’s spider trawling the Internet in search of just the vulnerability that that specific program just so happens to have. The more untested, potentially vulnerable applications an organization has running live, the more ‘tickets’ it has entered in this not-so-fun drawing. While there’s a little bit of luck to everything in life, as an information security leader it’s not your job to rely solely on luck. If you had the chance, wouldn’t you want to stack the odds


description

When consumers walk into their favorite stores, restaurants or other places of business, the first assumption they make is that they’ll be safe. No reputable business would run a place where customers had to worry about being robbed or pickpocketed. And yet, when these very same businesses invite their customers to interact with them online, all safety concerns go out the window. Even as many organizations pour money into new Web applications to connect with customers, very few are dedicating any real effort to ensuring these applications are safe from attacks. Developers are pushed to rush apps online without checking code for dangerous vulnerabilities because decision-makers figure no bad guys would bother to attack their little space on the Web. But the truth is that with advancements the underground hacking community has made, it’s not only possible but very common for the criminals to automate their attacks. Their networks of illegally controlled machines are trawling the Internet ‘round the clock, searching for common Web application vulnerabilities. These automated attacks don’t discriminate between large or small businesses. They’re just looking for easy-to-breach applications. And once the hackers get a toe-hold into your site,