Issue Overview
Information Security magazine - February 2009In difficult economic times, security pros must measure risk and prioritize projects. Get tips from the experts to improve your network security strategy during a recession. Plus, read the results of our yearly priorities survey and find out what made the list of top security concerns this year. Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
10 tips to improve your network security strategy in a recession
Here are 10 steps you can take to improve your threat management posture that require minimum investment, manpower and give you a fast return on your investment.
-
Recession forces security to measure and prioritize risks
Compliance demands, hacker threats, insider risks and integration concerns brought on by mergers and acquisitions make information security somewhat recession proof.
-
Encryption, DLP, disaster recovery top 2009 priorities
Information Security magazine's annual Priorities 2009 survey identifies data protection and disaster recovery among the top priorities for security managers.
-
Product Review: IronKey Enterprise Secure Flash Drive
by Ed Tittel, Contributor
IronKey Enterprise Secure Flash Drives enable organizations to control access to sensitive information on portable flash drives.
-
10 tips to improve your network security strategy in a recession
-
-
Product Review: PGP Endpoint
PGP Endpoint provides automated whole disk encryption that is centrally managed.
-
Product Review: Rohati TNS 100
Rohati's Transaction Network System brings NAC to the application level, and delivers granular access control for Web-based applications and file shares.
-
Product Review: Astaro Mail Gateway 4000
Astaro Mail Gateway 4000 is an antivirus and antispam appliance that is suitable for a midmarket organizations because of its simple central management capabilities.
-
Product Review: PGP Endpoint
-
Columns
-
Vein-reader biometric authentication for health care, financials
Health care facilities, along with financial institutions, are prime market targets for vein-reading technology, the latest in biometric applications.
-
Shoestring security budgets mean innovation and prioritization
Security managers face a lean economic year in 2009, but that doesn't mean threats and compliance demands will abate.
-
Proactive state privacy laws change security focus to prevention
New data breach notification acts in Nevada and Massachusetts are changing the way that organizations handle data.
-
Schneier, Ranum debate social networking risks
Should companies be concerned about employees' social networking? Bruce Schenier and Marcus Ranum take opposite sides on this issue.
-
Vein-reader biometric authentication for health care, financials
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO