Issue Overview
Information Security magazine - April 2012Access this month’s issue to uncover the latest tokenization trends (including, payment card data security, tokenization as a service, as well as protecting PII data) and explore how this revived technology not only offers enhanced data protection, but can ease the burden of compliance audits. Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Unified threat management devices for the enterprise
by Joel Snyder, Contributor
UTMs aren’t just for SMBs anymore. Here are four requirements for enterprise-grade UTM.
-
AMI networks: PKI security considerations
by Seth Bromberger, Contributor
PKI components in smart grid and AMI infrastructure introduce new hazards.
-
Unified threat management devices for the enterprise
by Joel Snyder, Contributor
-
-
Understanding tokenization: What is tokenization and when to use it
by Adrian Lane, Contributor
Tokenization protects sensitive data to reduce the compliance burden.
-
Web browser security features make attacks harder
by Robert Westervelt, News Director
Accuvant analysis and hacking contests illustrate browser security improvements.
-
Understanding tokenization: What is tokenization and when to use it
by Adrian Lane, Contributor
-
Columns
-
Don’t turn security Big Data analysis into a forgettable cliché
by Michael S. Mimoso, Editorial Director
It’s easy to be cynical about the latest security buzzword, but don’t be so quick to dismiss it.
-
Marcus Ranum chat: Security startups and security innovation
by Marcus Ranum
Security expert Marcus Ranum talks with Peter Kuper, a partner with In-Q-Tel focused on funding compelling startups to accelerate innovation for the intelligence community.
-
Information security roles and technology shifts
by Paul Rohmeyer, Contributor
New technologies and business models are rapidly changing the role of the security pro.
-
Don’t turn security Big Data analysis into a forgettable cliché
by Michael S. Mimoso, Editorial Director
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO