Issue Overview
Information Security magazine - June 2012In this month’s issue, Global Vice President of the Information Security Forum, Steve Durbin, offers five actions you can take to prepare for today’s external threats, proven steps to counter internal threats, and practical advice on how to better prepare and respond to foreseen (and unforeseen) compliance regulations. Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Cybersecurity information sharing initiatives on the rise
by Robert Lemos, Contributor
Businesses and government agencies work to improve sharing of cyberthreat information.
-
Security information management systems and application monitoring
by Joel Snyder, Contributor
SIMs aren’t just for network monitoring anymore.
-
Cybersecurity information sharing initiatives on the rise
by Robert Lemos, Contributor
-
-
Challenges with data protection in the cloud
by Dave Shackleford, Contributor
Capabilities such as encryption and DLP can be complicated in the cloud.
-
CISPA cybersecurity legislation wins industry support
by Robert Westervelt, News Director
Legislation designed to provide the federal government with threat data from the private sector gains steam.
-
Challenges with data protection in the cloud
by Dave Shackleford, Contributor
-
Columns
-
Reporter notebook: SCADA security, Oracle vulnerability, SQL Slammer
by Michael S. Mimoso, Editorial Director
Reflections on the ICS CERT alert, Oracle’s handling of a zero-day and more.
-
Marcus Ranum chat: Software development practices and security
by Marcus Ranum, Contributor
Security expert Marcus Ranum talks with Brian Chess, formerly of HP, about coding practices and security.
-
Information security threats: Building risk resilience
by Steve Durbin, Contributor
Enterprises need an agile risk management strategy to deal with today’s evolving threats.
-
Reporter notebook: SCADA security, Oracle vulnerability, SQL Slammer
by Michael S. Mimoso, Editorial Director
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO