Issue Overview
Information Security magazine - February 2005In month’s Information Security magazine, JPMorgan Chase's Anish Bhimani reveals 12 security lessons he didn't learn until after becoming a CISO. We also review "The Network Security Bible" to help you decide if it's a must-read. Learn about the latest security products launched this month, and read a review of IronPort's C-Series Messaging Gateway, AirTight Networks' SpectraGuard 2.0, Funk Software's Odyssey Client 3.03 and Odyssey Server 2.01, and more. Also, read features about security metrics, managed services and SSHv2. Finally, we reveal 12 things they didn't teach you in security school about becoming a CISO. Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Secure Reads: The Network Security Bible
A review of the Network Security Bible by Eric Cole, Ronald Krutz and James W. Conley
-
Desktop Security: Senforce Portable Firewall Plus
Senforce's Senforce Portable Firewall Plus
-
Wireless security product review: AirTight Networks' SpectraGuard 2.0
A review of AirTight Networks' SpectraGuard 2.0
-
Database Security: Ingrian i211 DataSecure Platform
Ingrian Networks' Ingrian i211 DataSecure Platform
-
In MSSPs We Trust
Regulatory and cost-cutting pressures are forcing enterprises to reexamine the value of managed security services.
-
On the Job
12 lessons they don't teach you in security school about being a CISO.
-
Secure Reads: The Network Security Bible
-
-
Recent Releases: Security product briefs, February 2005
Learn about the security products launched in February 2005.
-
IronPort C-Series Messaging Gateway: Antivirus, Antispam tool
Enhance your email security strategy with IronPort's C-Series Messaging Gateway. In this product review you will get information on cost, installation, reporting, configuration, and antivirus and antispam technology.
-
Hot Pick: Funk Software's Odyssey Client 3.03 and Odyssey Server 2.01
Funk Software's Odyssey Client 3.03 and Odyssey Server 2.01
-
SSHv2: Safe & Secure
The overhauled encryption protocol helps harden networks.
-
Security: Measuring Up
by Pete Lindstrom, Contributor
Metrics are the key to measuring security. Learn how to gather data and calculate the answers you need.
-
Recent Releases: Security product briefs, February 2005
-
Columns
-
Logoff: The battle against spyware
Spywary
-
On the Radar
Firewall Redundancy?
-
Perspectives: Symantec, Veritas pairing to change security
Symantec's merger with Veritas will change security managers' lives.
-
Editor's Desk: Nessus charges for signature updates
No Free Lunches
-
Logoff: The battle against spyware
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO