Access your Pro+ Content below.
Winning strategies for integrating security information management and identity access management
This month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more.
Access this PRO+ Content for Free!
Features in this issue
HIPAA security compliance has been a mixed bag but HITECH ups the ante
Integrating security information management systems with identity management systems ties policy violations and vulnerabilities to user activity
Learn how to develop an effective information security metrics program and pitfalls to avoid.
Knowledge-based authentication helps catch fraud, but the authentication technology poses customer privacy issues.
Columns in this issue
The HITECH Act increases penalties for a lack of HIPAA security compliance but will it really improve health care security?
A successful career in information security requires an effective information security career plan
Organizations must enhance network intrusion detection systems with supporting processes to uncover genuine threats