Issue OverviewInformation Security magazine - March 2010
This month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more. Access >>>
Premium Content for Free.
HITECH Act increases HIPAA security requirements
HIPAA security compliance has been a mixed bag but HITECH ups the ante
Creating meaningful information security metrics
by Andrew Jaquith, Forrester Research, Inc.
Learn how to develop an effective information security metrics program and pitfalls to avoid.
- HITECH Act increases HIPAA security requirements
Joining security information management systems with identity management systems boosts security
by Randall Gamby, Contributor
Integrating security information management systems with identity management systems ties policy violations and vulnerabilities to user activity
Knowledge-based authentication poses privacy issues
Knowledge-based authentication helps catch fraud, but the authentication technology poses customer privacy issues.
- Joining security information management systems with identity management systems boosts security by Randall Gamby, Contributor
Is HITECH Act a game changer?
The HITECH Act increases penalties for a lack of HIPAA security compliance but will it really improve health care security?
Develop an effective information security career plan
by Lee Kushner and Mike Murray
A successful career in information security requires an effective information security career plan
Relying on basic network intrusion detection systems isn't enough
Organizations must enhance network intrusion detection systems with supporting processes to uncover genuine threats
- Is HITECH Act a game changer?
More Premium Content Accessible For Free
The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...
Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...