Issue OverviewInformation Security magazine - October 2005
These Security 7 Award winners are the pros who are the first to identify DDoS attacks, secure trillions in banking funds, lock down Tier 1 carriers, manage the world's fifth largest network and defend hundreds of thousands of employees and partners. Also in this issue, learn about VoIP hang-ups and SQL Server safeguards. Access >>>
Premium Content for Free.
Security Seven Awards
Seven winners. Seven verticals. Countless achievements.
Education: Dave Dittrich
Financial Services: Christofer Hoff
Telecommunications: Edward Amoroso
Government: Charles McGann
Energy: Richard Jackson
Manufacturing: Hans-Ottmar Beckmann
Health Care: Patrick Heim
Profiles by Michael S. Mimoso, Bill Brenner, Herman Mehling, Susan Hildreth, Mark Baard
SQL Server 2005 Premieres
Next month, Microsoft adds a star-studded cast of security features to its database system.
Secure Reads: InfoSec Career Hacking
Read a review of the security book: "InfoSec Career Hacking: Sell Your Skillz, Not Your Soul"
Antivirus: F-Secure's Anti-Virus Client Security 6.0
F-Secure's Anti-Virus Client Security 6.0
Recent Releases: Security product briefs, October 2005
Take a look at the security products released in October 2005.
- Security Seven Awards
Antispyware: Blue Coat Systems' Spyware Interceptor SI-1
Blue Coat Systems' Spyware Interceptor SI-1
Will VoIP's shortcomings give businesses a wake-up call?
Hot Pick: Hercules 4.0 Enterprise Vulnerability Management Suite
Citadel Security Software's Hercules 4.0 Enterprise Vulnerability Management Suite
Digital Rights Management: Microsoft Windows Rights Management Services
Microsoft's Windows Rights Management Services
Finjan Software's Vital Security Appliance NG-1100
- Antispyware: Blue Coat Systems' Spyware Interceptor SI-1
On The Radar: Tools to survive the security wilderness
Perspectives: The Rise of Dataflation
Dataflation is the destabilizing tendency of data to lose value due to factors such as large-scale unauthorized access, excessive abuse and loss of confidentiality.
Editor's Desk: The need for constant vigilance
Ping: Jennifer Granick
- On The Radar: Tools to survive the security wilderness
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...