More from SearchSecurity -- April 2006

Highlights from this month's issue of Information Security magazine.

April 06 Cover


Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on SearchSecurity.com.


THIS MONTH ON SEARCHSECURITY.COM

Intrusion Defense School
Attend our Intrusion Defense School led by guest instructor Joel Snyder, and learn how to implement various technologies, such as antivirus, UTM and IDS/IPS, to harden the network perimeter. CISSPs and SSCPs who attend our series of 20-minute webcasts are eligible to earn 1 CPE credit from (ISC)².
Go to Intrusion Defense School 
The Merits of Intrusion Defense
Intrusion defense programs are often touted for their ability to guard against today's evolving threats. Based on an exclusive survey of IT professionals, the SearchSecurity.com news team takes a look at real-world intrusion defense programs and which vendors are considered most valuable.
Read "Intruder Alert"
News When You Want It
If you find it difficult to stay current on the latest developments in the infosec industry, then tune into our Security Wire Weekly audio broadcasts. Produced by SearchSecurity.com's award-winning news team, you can listen each week on your PC or favorite mobile device when and where it's convenient for you. Listen to our security podcasts

Security Survivor All-Stars
You read five case studies examining the breaches at ChoicePoint, Georgia DMV, DSW Shoe Retail and Lexis-Nexis, and learned how they retooled their procedures, processes, policies and technologies to avoid making headlines again. Now read more tips for keeping your customers' data secure.
>> READ OUR DATABASE SECURITY TIPS



Get a Grip
In this month's issue of Information Security magazine, you learned strategies and approaches you can use to take control of mobile devices to ensure your organization's security. Now join us for a one-hour webcast on April 20 at noon ET, to learn about the business options for securing mobile wireless endpoints like smartphones and PDAs.
>> REGISTER TODAY

Then read our tip for advice on how to write policies that address mobile devices and their risks.
>> Policies for reducing mobile risk



Alphabet Soup
In this month's issue, security expert Shon Harris helps make sense of the dizzying array of risk management methodologies and standards businesses have to choose from. For more risk assessment and management advice from Shon, check out our Ask the Experts feature. If you don't find the answers you need, you can submit your own questions.
>> READ SHON'S ASK THE EXPERT RESPONSES
>> ASK SHON A QUESTION



Transit Safety
You learned about the differences between SSL 3.0 and TLS, as well as some uses for SSL you may not have considered. Now test your knowledge of Web application security by taking our quiz.
>> TAKE THE QUIZ



PING with Jane Scott Norris
In an interview with Information Security magazine, Jane Scott Norris, the Department of State's first CISO, offers some insight on what it takes to become a CISO.
>> READ THE INTERVIEW





HIGHLIGHTS ARCHIVES
March 2006 February 2006 January 2006 December 2005 November 2005 October 2005
September 2005 August 2005 July 2005 June 2005 May 2005 April 2005
This was first published in March 2006

Dig deeper on Identity Theft and Data Security Breaches

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close