Issue Overview
Information Security magazine - July/August 2007Put this on your summer reading list to ensure security's a breeze. This issue includes 18 sizzling tips for dealing with office politics, security extranets, protecting your brand and handling emerging technologies. Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Emerging Technologies: How to secure new products
New business initiatives mean new threats.
-
Protecting Your Brand
Customer confidence is at risk when a breach occurs.
-
Securing Extranets
Is perimeter security viable with Swiss cheese networks?
-
At Your Service: Veracode's SaaS-based application analysis
Veracode
-
Metasploit Framework 3.0 Product Review
In this product review, learn everything about the Metasploit Framework 3.0, a penetration testing tool for Linux and Windows platforms.
-
Emerging Technologies: How to secure new products
-
-
Office Politics
Success requires skills in business, technology and people.
-
Antivirus: ESET's NOD32 Antivirus 2.7
ESET's NOD32 Antivirus 2.7
-
Unified Threat Management: Secure Computing's Sidewinder 2150 v7
Secure Computing's Sidewinder 2150 v7
-
Encryption software vendors can expect challenge from hardware front
Until now, the laptop encryption market has belonged to software vendors. Learn how all that has changed.
-
Endpoint Security: F-Secure's Client Security 7.0
F-Secure's Client Security 7.0
-
Office Politics
-
Columns
-
Ping: Dave Drab
Dave Drab
-
Perspectives: Smoke and mirrors certifications
Professional organizations use ethics policies to protect their certifications instead of promoting ethical behavior.
-
Editor's Desk: Freeing Julie Amero
Justice Served
- Viewpoint: Background check faux pas
-
Ping: Dave Drab
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO