Pro+ Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
February 2004

Editor's desk: The future of 'Information Security' magazine

If you're anything like me, you probably picked up this month's issue, saw the new cover design and immediately began flipping through the pages. Yes, we've changed virtually everything about Information Security -- the most comprehensive redesign of the magazine since its inception in 1997. But it's more than a new look; it's a whole new package that's focused on the specific aspects of security that you need in your everyday work lives. The visual and design changes are tightly bound to a new editorial focus. The editors of Information Security thought about the workings of infosecurity programs and how managers address their security concerns. We devised the "4 Ps" of security philosophy -- people, policies, processes and products. We know security managers are starved for information, guidance and intelligence, so the 4 Ps help us direct our coverage in new feature categories: Bakeoffs: The head-to-head testing of leading security solutions. Techknowledge: in-depth examinations of technologies, solutions and methodologies. ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • SOX section 404: Improving security with executive communications

    by  Edward Hurley

    It's widely held that the Sarbanes-Oxley Act will be the two-by-four that gets upper management to pay serious attention to infosecurity. Here you will learn how SOX section 404 plays a hand in improving seucrity with executive communications.

  • Best practices for security report writing

    by  Robert Garigue and Marc Stefaniu

    Concise, targeted security reports command the attention of the executives who need to act on them. Learn best practices for security report writing.

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close