Issue OverviewInformation Security magazine - July/August 2011
This month's Information Security magazine online cover story highlights the concern surrounding self-defending networks and explores a new approach to network security – CTOps. Also, learn how to uncover hidden opportunities that could be lurking in your overflow of data and gain an in-depth look at the biggest IT giants in today's security market. Access >>>
Premium Content for Free.
Information security market consolidation: A mixed bag
by Marcia Savage
Big tech companies are scooping up security vendors with mixed results.
PCI virtualization guidance warns of compliance challenges
by Robert Westervelt
PCI group outlines challenges in achieving compliance with payment data on virtualized systems.
- Information security market consolidation: A mixed bag by Marcia Savage
Turn your computer incident response team into counter-threat operations
by Richard Bejtlich, Contributor
Fending off modern computer attacks requires actively hunting down intruders.
Striving for better information security intelligence
by Scott Crawford
Security teams strive to gain visibility from a deluge of security information and put that data to work.
- Turn your computer incident response team into counter-threat operations by Richard Bejtlich, Contributor
Your information security career and the job market: Value of information security skills
by Lee Kushner and Mike Murray
Be aware of changing technology and industry trends, and your job prospects will fall in line.
The threat landscape and Web 2.0 technologies
by Ravila Helen White
The idea that social media and other Web 2.0 technologies have vastly altered the threat landscape is plain wrong.
Does information security market consolidation mean the end of the line?
by Marcia Savage
Large IT companies are buying up security vendors, but that doesn’t mean there won’t be plenty of room for innovative startups.
- Your information security career and the job market: Value of information security skills by Lee Kushner and Mike Murray
More Premium Content Accessible For Free
The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...
Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...