Issue OverviewInformation Security magazine - October 2006
In this month's issue of Information Security magazine, meet the Security 7 Award winners for this year -- security superstars who go above and beyond. Take a look inside for this year's winners. We review "S*PAM KiNgs: The Real Story Behind The High-Rolling Hucksters Pushing Porn, Pills and @*#?% Enlargements." Find out why enterprise rights management software is being used by enterprise to secure their most valuable documents and sensitive content. Read about the importance of data governance and data protection. Also inside: Read features on protecting database assets and Enterprise Rights Management (ERM). Access >>>
Premium Content for Free.
Simply the Best: Security 7 Awards 2006
by Information Security magazine staff
Information Security's 2006 Security 7 Awards honor innovative security professionals in seven vertical markets.
Risk Management: ClearPoint Metrics' Metrics Accelerator 1.1
Read this risk management security product review of Risk Management: ClearPoint Metrics' Metrics Accelerator 1.1.
Imprivata's OneSign ENA product review
Product review of Imprivata's OneSign ENA cost effective network authentication tool, which manages USB tokens, smartcards, OTPs and fingerprint biometrics.
by Wylie Wong
ENTERPRISE RIGHTS MANAGEMENT
ERM software is being adopted by businesses to secure their most valuable documents and sensitive content.
Authentication: MXI Security's Stealth MXP
MXI Security's Stealth MXP
That Sinking Feeling
Before you lose something precious, govern your data.
- Simply the Best: Security 7 Awards 2006 by Information Security magazine staff
- At Your Service: October 2006 managed services security news
Recent releases: Security product briefs, October 2006
Read about the recently released security products of October 2006.
Secure Reads: Spam kings
Read a quick review of the book "S*PAM KiNgs: The Real Story Behind The High-Rolling Hucksters Pushing Porn, Pills and @*#?% Enlargements."
Sophos' Sophos Endpoint Security
- Events: Information security conferences for October 2006
- Viewpoint: MBAs don't fit in midmarket
Layer 8: Measuring information security success
Clarity or Conspiracy?
Ping: Suzanne Hall
Editor's Desk: Saluting security's superstars
Perspectives: Security must be one with business goals
Information security can no longer pit itself against ease of use and business objectives.
- Layer 8: Measuring information security success
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...