Issue Overview
Information Security magazine - October 2005These Security 7 Award winners are the pros who are the first to identify DDoS attacks, secure trillions in banking funds, lock down Tier 1 carriers, manage the world's fifth largest network and defend hundreds of thousands of employees and partners. Also in this issue, learn about VoIP hang-ups and SQL Server safeguards. Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Security Seven Awards
Seven winners. Seven verticals. Countless achievements.
Education: Dave Dittrich
Financial Services: Christofer Hoff
Telecommunications: Edward Amoroso
Government: Charles McGann
Energy: Richard Jackson
Manufacturing: Hans-Ottmar Beckmann
Health Care: Patrick Heim
Profiles by Michael S. Mimoso, Bill Brenner, Herman Mehling, Susan Hildreth, Mark Baard -
SQL Server 2005 Premieres
Next month, Microsoft adds a star-studded cast of security features to its database system.
-
Secure Reads: InfoSec Career Hacking
Read a review of the security book: "InfoSec Career Hacking: Sell Your Skillz, Not Your Soul"
-
Antivirus: F-Secure's Anti-Virus Client Security 6.0
F-Secure's Anti-Virus Client Security 6.0
-
Recent Releases: Security product briefs, October 2005
Take a look at the security products released in October 2005.
-
Security Seven Awards
-
-
Antispyware: Blue Coat Systems' Spyware Interceptor SI-1
Blue Coat Systems' Spyware Interceptor SI-1
-
Security Hang-ups
Will VoIP's shortcomings give businesses a wake-up call?
-
Hot Pick: Hercules 4.0 Enterprise Vulnerability Management Suite
Citadel Security Software's Hercules 4.0 Enterprise Vulnerability Management Suite
-
Digital Rights Management: Microsoft Windows Rights Management Services
Microsoft's Windows Rights Management Services
-
Security Gateway
Finjan Software's Vital Security Appliance NG-1100
-
Antispyware: Blue Coat Systems' Spyware Interceptor SI-1
-
Columns
-
On The Radar: Tools to survive the security wilderness
Ice Breakers
-
Perspectives: The Rise of Dataflation
Dataflation is the destabilizing tendency of data to lose value due to factors such as large-scale unauthorized access, excessive abuse and loss of confidentiality.
-
Editor's Desk: The need for constant vigilance
Crib Notes
-
Ping: Jennifer Granick
Jennifer Granick
-
On The Radar: Tools to survive the security wilderness
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO