Here's a sneak peek at our February issue:
In this issue of Information Security, we look at the impact of the recession on information security programs and offer you advice on managing your spending, policies, processes and people to get the most out of the limited resources you can expect this year.TABLE OF CONTENTS
Cover Story Compliance demands, hacker threats, insider risks and integration concerns brought on by mergers and acquisitions make information security somewhat recession proof. Learn from peers and experts on how to best maintain an upright security posture against outside pressures that won't abate.
Good Security on the Cheap
In this article, we provide you with 10 steps you can take to improve your threat management posture that require minimum investment, manpower and give you a fast return on your investment.
Information Security magazine's annual Priorities 2009 survey identifies data protection and disaster recovery among the industry's top priorities.
The Breach of All Breaches?
Heartland's founder and CEO is calling for changes on the scale of Johnson & Johnson's Tylenol recall and safety seal innovation, but experts say constant vigilance is the only way to defend against cybercriminals.
Raising the Bar
Tough new data protection laws in Massachusetts and Nevada up the ante for security.
Finally, Bruce Schneier and Marcus Ranum square off once again; this month they debate the risks associated with social networking in Face-Off.
In addition to the February issue, you can now access all Information Security magazine archives and related content on SearchSecurity.com. Please note, you may be prompted to log in to SearchSecurity.com to view the archives.
Please let us know what you think of the new digital version of Information Security. Send us a note at firstname.lastname@example.org.