Issue OverviewInformation Security magazine - June 2009
This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more. Access >>>
Premium Content for Free.
How to write a risk methodology that blends business, security needs
One security professional describes a homegrown risk methodology currently being used by a large university and a private corporation.
Lack of cloud computing definition adds confusion, risk
Vendors loosely using the term cloud computing are causing confusion for users in the market for buying and securing these services.
- How to write a risk methodology that blends business, security needs
Risk management must include physical-logical security convergence
If your organization is serious about managing risk and total asset protection, then physical-logical convergence is a necessary step.
Mature SIMs do more than log aggregation and correlation
They've come a long way from the early days of log aggregation and correlation; enterprises now glean value from SIMs for compliance, visualization, and even overall business intelligence.
- Risk management must include physical-logical security convergence
Three cloud computing risks to consider
Cloud computing carries risks that enterprises need to weigh before they forge ahead.
New partnerships, creative thinking help security bust recession
The economy is forcing organizations to be more resourceful and bury the hatchet. And that's a good thing.
- Three cloud computing risks to consider
More Premium Content Accessible For Free
Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their ...
Not only is modern malware getting more prevalent and sophisticated, it's also now focusing on a broader array of targets. Attackers would still love...
IT Decision Center
Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.