Access your Pro+ Content below.
Effectively navigating the security risk assessment process
This month’s Information Security magazine cover story focuses on active strategies for malware resistance and compliance, data protection and incident responses found in VDI approaches. Learn how you can implement three top strategies to ensure your active desktop security isn’t compromised.
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
PCI Security Standards Council plans to release a list of certified components in April.
An effective risk assessment process is essential, but many factors can skew the process and get in the way of security.
ISM November 2011 cover story: Eric Ogren on how virtual desktop infrastructure enhances compliance, data protection and malware protection.
Cybercriminals are zeroing in on small and midsize businesses with fewer security resources.
Columns in this issue
Security expert and Information Security magazine columnist Marcus Ranum talks to Richard Bejtlich, CSO and vice president, Mandiant Computer Incident Response Team (MCIRT) at security firm Mandiant.
We all have an explanation for weak security, but everyone needs to do their part to improve it.
China is being accused of hacking corporate, government and military networks in the U.S. for economic gain. Policy makers need to be versed in cybersecurity and figure out how to respond.