![Cover for Practices for Enhancing Data Security - a survey of organisations in the UK and the US](https://www.bloorresearch.com/wp-content/uploads/2015/01/cover-practices-for-enhancing-data-security-12085.jpg)
Practices for Enhancing Data Security - a survey of organisations in the UK and the US
Published: 23rd February 2015 | By: Fran Howarth
This report is based on a survey of 200 organisations in the UK and the US, all of which have more than 1,000 employees.
![Cover for IBM: enhanced 360° view](https://www.bloorresearch.com/wp-content/uploads/2014/10/cover-ibm-enhanced-360-view-12055.jpg)
IBM: enhanced 360° view
Published: 19th October 2014 | By: Philip Howard
This paper briefly considers relevant IBM technologies and solutions in the context of the requirements discussed
![Cover for Security intelligence: solving the puzzle for actionable insight](https://www.bloorresearch.com/wp-content/uploads/2014/09/cover-security-intelligence-solving-the-puzzle-for-actionable-insight-12040.jpg)
Security intelligence: solving the puzzle for actionable insight
Published: 8th September 2014 | By: Fran Howarth
The extent of security incidents and breaches seen today is so high and so widespread that no organisation should be complacent
![Cover for The need to protect against file-based attacks - statistical evidence for the need for greater assurance](https://www.bloorresearch.com/wp-content/uploads/2014/02/cover-the-need-to-protect-against-file-based-attacks-11975.jpg)
The need to protect against file-based attacks - statistical evidence for the need for greater assurance
Published: 21st February 2014 | By: Fran Howarth
The underlying structure of many document types makes it a relatively easy task to embed malicious code, downloading malware onto the devices of those users.
![Cover for Technology evolution & its impact on security - why the endpoint must be the new focus](https://www.bloorresearch.com/wp-content/uploads/2013/10/cover-technology-evolution-its-impact-on-security-11891.jpg)
Technology evolution & its impact on security - why the endpoint must be the new focus
Published: 24th October 2013 | By: Fran Howarth
Organisations will benefit from investing in security technologies that provide greater insight into activity occurring on both their networks and the systems.