Access your Pro+ Content below.
2009 Security Readers' Choice Awards
This issue of Information Security Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.
Features in this issue
For the fourth consecutive year, Information Security readers voted to determine the best security products. A record 1721 voters participated this year, rating products in 17 different categories.
The demonstration of a hacking tool at Black Hat that allows attackers to escape from virtual machines to attack their guest OS elevates the seriousness of security threats to virtualization.
Encryption solves some very straight-forward problems but implementation isn't always easy. We'll explain some of the common misperceptions so you'll understand your options.
Columns in this issue
Accountability for Internet security should be placed on users, not service providers such as hotels.
Security experts Bruce Schneier and Marcus Ranum debate whether perfect access control is possible.
Passing an audit can lull an organization into a false sense of security.