Issue Overview
Information Security magazine - February 2004Deciding when to patch and when not to patch can be very tricky. It all depends on the value of your protected assets, the threat level, the presence of other mitigating factors and the required effort and resources. Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
A Patch in Time: Considering automated patch management
by Pete Lindstrom, Contributor
Vulnerabilities are followed by patches, followed by exploits, followed by misery. Automated patch management solutions ease the pain and cut costs.
-
Cyberspace security liability lawsuits on the rise?
by Edward Hurley
Double jeopardy doesn't apply in cyberspace, and the coming wave of downstream security liability lawsuits could make your organization a victim twice over.
-
Best practices for security report writing
by Robert Garigue and Marc Stefaniu
Concise, targeted security reports command the attention of the executives who need to act on them. Learn best practices for security report writing.
-
A Patch in Time: Considering automated patch management
by Pete Lindstrom, Contributor
-
-
Red-zone defense: Products to prevent IP Leakage
by Kevin Beaver
New technologies to support intellectual property and keep your IP under lock and key.
-
SOX section 404: Improving security with executive communications
by Edward Hurley
It's widely held that the Sarbanes-Oxley Act will be the two-by-four that gets upper management to pay serious attention to infosecurity. Here you will learn how SOX section 404 plays a hand in improving seucrity with executive communications.
-
Red-zone defense: Products to prevent IP Leakage
by Kevin Beaver
-
Columns
-
Editor's desk: The future of 'Information Security' magazine
by Lawrence M. Walsh
Lawrence Walsh explains why the combo of "Information Security" and SearchSecurity.com is the industry's No. 1 trusted infosec resource.
-
React in seconds with a network incident response plan
by Marcus Ranum
A network incident response plan enables the split-second reactions necessary to survive next-generation attacks.
-
OS Hardening and Other Essential Linux Skills for Maintaining Security
by Jay Beale
Jay Beales outlines must-have Linux skills for administrators.
-
The 'antiworm' evolution: Can it help Internet worm protection?
by Pete Lindstrom, Contributor
New "antiworm" or "worm containment" solutions promise new prevention and detection techniques that reduce or eliminate propagating worms. But do they work?
-
Security jargon: Using IT language analogies to explain information security
by Andrew Briney
Information security is a business of nonstop metaphors, cliches, similes and comparisons. Should we all agree to put a moratorium on using IT language analogies to describe what we do?
-
Editor's desk: The future of 'Information Security' magazine
by Lawrence M. Walsh
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO