Information Security Magazine February 2009

Information Security
February issue download


Download the entire February issue of Information Security magazine here in PDF format.

Here's a sneak peek at our February issue:

In this issue of Information Security, we look at the impact of the recession on information security programs and offer you advice on managing your spending, policies, processes and people to get the most out of the limited resources you can expect this year.

TABLE OF CONTENTS

Troubled Times
Cover Story Compliance demands, hacker threats, insider risks and integration concerns brought on by mergers and acquisitions make information security somewhat recession proof. Learn from peers and experts on how to best maintain an upright security posture against outside pressures that won't abate.

Good Security on the Cheap
In this article, we provide you with 10 steps you can take to improve your threat management posture that require minimum investment, manpower and give you a fast return on your investment.

Under Pressure
Information Security magazine's annual Priorities 2009 survey identifies data protection and disaster recovery among the industry's top priorities.

The Breach of All Breaches?
Heartland's founder and CEO is calling for changes on the scale of Johnson & Johnson's Tylenol recall and safety seal innovation, but experts say constant vigilance is the only way to defend against cybercriminals.

Raising the Bar
Tough new data protection laws in Massachusetts and Nevada up the ante for security.

Finally, Bruce Schneier and Marcus Ranum square off once again; this month they debate the risks associated with social networking in Face-Off.

In addition to the February issue, you can now access all Information Security magazine archives and related content on SearchSecurity.com. Please note, you may be prompted to log in to SearchSecurity.com to view the archives.

Please let us know what you think of the new digital version of Information Security. Send us a note at feedback@infosecuritymag.com.

This was last published in February 2009

Dig Deeper on Security vendor mergers and acquisitions

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close