Competitive Analysis

Who are your competitors? What do they offer? For which customers do you compete? What will you have to do to get customers to choose your business over theirs? By assessing the strengths and weaknesses of current and potential competitors, you can develop both offensive and defensive strategies that will help you identify opportunities as well as threats to your business. An in-depth profile of competitors looks at each one's background, finances, products, markets, facilities, personnel and strategies.


Articles

World Cup Spurs Cyber-Attacks, Digital Protests

Cyber-criminals use the quadrennial soccer contest as a phishing lure for unsuspecting victims, while Anonymous supports domestic protesters by defacing Web sites and by launching denial-of-service attacks. More >

IPv6 Security: Not Scary, Unless It Is Ignored

The importance of transitioning from IPv4 - with its relatively small number of addresses - to the radically larger IPv6 scheme is well documented. The next big landmark is three months away. On More >

Evolving DDOS Attacks Blend in with Legit Traffic

It certainly is good news that AT&T included distributed denial of service attacks (DDOS) protection in the managed firewall service for small- and medium-size companies it introduced last month. More >

More Articles >

Interviews

Bogus Deals, Great Delivery Platforms

Carl Weinschenk spoke to Ciaran Bradley, the vice president of handset security products for AdaptiveMobile. On Dec. 19, the Irish security vendor released a report indicating that the U.S. was the victim of the most SMS spam in the world.

More >

Attacks Go Low and Slow

Carl Weinschenk spoke with Paul Sop, CTO, Prolexic. The company just released its latest Weather Report, which noted an increased in zombie-based peer-to-peer attacks.   Weinschenk: What's More >

Biometrics Recognizes Its Promising Future

Carl Weinschenk spoke with Patrick Audley, CTO, Cogneto. Last month, Cogneto launched a facial recognition system aimed at the banking industry.   Weinschenk: How would you characterize the More >

More Interviews >

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Editor's Choice

Top Five DevOps and Ops Team Challenges for 2015

Security Staffing

Explore the five challenges teams need to address – from cultural changes and shifting ownership to hybrid environment complications, as well as steps to take now that will help teams overcome future challenges.

 More >

The Right Way to Do the Hybrid Cloud

Tata Communications Launches Global Cloud Network

With Lollipop, Android Tries to Lick Its Security Problems

The ‘Black Box’ Era of IT

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

Security9-290x195 Framework for Improving Critical Infrastructure Cybersecurity

The Framework enables organizations – regardless of size, degree of cybersecurity risk, or cybersecurity sophisticat...

Guide to Malware Incident Prevention and Handling for Desktops and Laptops

This publication provides recommendations for improving an organization’s malware incident prevention measures and e...

Protecting DNS Servers from Denial of Service Threats Protecting DNS Servers from Denial of Service Threats

Get US-CERT guidance on mitigating DoS threats to your DNS servers.

...

Fundamentals of Small Business Information Security Fundamentals of Small Business Information Security

SMBs must become more security-conscious as they become more attractive targets....

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Close
Thanks for your registration, follow us on our social networks to keep up-to-date