Issue Overview
Information Security magazine - October 2005These Security 7 Award winners are the pros who are the first to identify DDoS attacks, secure trillions in banking funds, lock down Tier 1 carriers, manage the world's fifth largest network and defend hundreds of thousands of employees and partners. Also in this issue, learn about VoIP hang-ups and SQL Server safeguards. Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Security Seven Awards
Seven winners. Seven verticals. Countless achievements.
Education: Dave Dittrich
Financial Services: Christofer Hoff
Telecommunications: Edward Amoroso
Government: Charles McGann
Energy: Richard Jackson
Manufacturing: Hans-Ottmar Beckmann
Health Care: Patrick Heim
Profiles by Michael S. Mimoso, Bill Brenner, Herman Mehling, Susan Hildreth, Mark Baard -
SQL Server 2005 Premieres
Next month, Microsoft adds a star-studded cast of security features to its database system.
-
Secure Reads: InfoSec Career Hacking
Read a review of the security book: "InfoSec Career Hacking: Sell Your Skillz, Not Your Soul"
-
Antivirus: F-Secure's Anti-Virus Client Security 6.0
F-Secure's Anti-Virus Client Security 6.0
-
Recent Releases: Security product briefs, October 2005
Take a look at the security products released in October 2005.
-
Security Seven Awards
-
-
Antispyware: Blue Coat Systems' Spyware Interceptor SI-1
Blue Coat Systems' Spyware Interceptor SI-1
-
Security Hang-ups
Will VoIP's shortcomings give businesses a wake-up call?
-
Hot Pick: Hercules 4.0 Enterprise Vulnerability Management Suite
Citadel Security Software's Hercules 4.0 Enterprise Vulnerability Management Suite
-
Digital Rights Management: Microsoft Windows Rights Management Services
Microsoft's Windows Rights Management Services
-
Security Gateway
Finjan Software's Vital Security Appliance NG-1100
-
Antispyware: Blue Coat Systems' Spyware Interceptor SI-1
-
Columns
-
On The Radar: Tools to survive the security wilderness
Ice Breakers
-
Perspectives: The Rise of Dataflation
Dataflation is the destabilizing tendency of data to lose value due to factors such as large-scale unauthorized access, excessive abuse and loss of confidentiality.
-
Editor's Desk: The need for constant vigilance
Crib Notes
-
Ping: Jennifer Granick
Jennifer Granick
-
On The Radar: Tools to survive the security wilderness
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO