Information Security Magazine, July 09: Controlling Privileged Accounts
EZINE:
This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
Posted: 13 Jul 2009 | Published: 13 Jul 2009
|
|
Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
EZINE:
This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
Posted: 10 Jun 2009 | Published: 10 Jun 2009
|
|
eGuide: Essential Guide to Identity & Access Management
EGUIDE:
This essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more.
Posted: 29 May 2009 | Published: 29 May 2009
|
|
Information Security Magazine, May 2009: Automating Compliance
EZINE:
This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.
Posted: 11 May 2009 | Published: 01 May 2009
|
|
Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee
EZINE:
This special issue of Information Security Magazine explains the ins and outs of security steering committees. Learn who needs to be there, why they need to be there, what they need to be doing, and how to help them do it.
Posted: 07 May 2009 | Published: 01 Jan 2009
|
|
Information Security Magazine: April 2009 - Is Data Loss Prevention keeping your data where it should be?
EZINE:
This month's issue of Information Security Magazine is centered on Data Protection. We've got articles covering Data Loss Prevention solutions and how they work in the real world, Log Management as it pertains to security forensics in the case of an unfortunate security event, and some compliance lessons from Delaware's Dept. of Technology.
Posted: 20 Apr 2009 | Published: 20 Apr 2009
|
|
Information Security Magazine: March 2009 - Sky-High Risk?
EZINE:
This month's issue of Information Security focuses on risk management. We'll cover many important topics, such as: Cloud Computing - cost savings vs. security concerns; Web 2.0 - ways monitor and manage Web 2.0 usage within your company; Web Application Firewalls - How to choose and implement the right WAF for your company; and much more.
Posted: 20 Apr 2009 | Published: 20 Mar 2009
|
|
Information Security Magazine - February 2009: BUDGET SQUEEZE - How to Maintain Security during a Recession
EBOOK:
Check out this eBook and get expert advice that can help your company successfully improve its threat management posture.
Posted: 08 Apr 2009 | Published: 01 Feb 2009
|
|
Essential Guide to Threat Management
EBOOK:
Check out this expert eBook and get expert advice that can help your company successfully improve its threat management posture.
Posted: 19 Mar 2009 | Published: 19 Mar 2009
|
|
eBook: Strategies for Securing Virtual Machines
EBOOK:
Check out this expert eBook to learn about the special security concerns of virtualization and get best practices for securing virtual machines.
Posted: 18 Dec 2008 | Published: 18 Dec 2008
|
|
Expert eBook: Encryption: Properly Securing Your Valuable Data
WHITE PAPER:
Check out this expert eBook and learn about best practices and techniques for protecting your company's data with encryption technology.
Posted: 28 Oct 2008 | Published: 28 Oct 2008
|
|
Readers' Choice Awards
JOURNAL ARTICLE:
Information Security and SearchSecurity.com presented more than 1,600 readers with some 360 security products, divided into 18 categories, three categories which failed to draw sufficient reader response are covered in market articles.
Posted: 13 Apr 2008 | Published: 01 Apr 2008
|
|
Network Firewalls
JOURNAL ARTICLE:
Cisco has been in business for more than 20 years and is emerging as a security powerhouse to be reckoned with, especially as security merges more with network operations in the enterprise.
Posted: 03 Apr 2007 | Published: 01 Apr 2007
|
|
Moving on Up
JOURNAL ARTICLE:
How do you rise in the security ranks? Don't speak geek; use the language of business.
Posted: 24 Aug 2006 | Published: 01 Jul 2006
|
|
Products of the Year 2006
JOURNAL ARTICLE:
As spyware becomes increasingly prevalent, antispyware tools are becoming more a necessity than a luxury.
Posted: 10 Aug 2006 | Published: 01 Feb 2006
|