Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on SearchSecurity.com.
Security Survivor All-Stars
You read five case studies examining the breaches at ChoicePoint, Georgia DMV, DSW Shoe Retail and Lexis-Nexis, and learned how they retooled their procedures, processes, policies and technologies to avoid making headlines again. Now read more tips for keeping your customers' data secure.
>> READ OUR DATABASE SECURITY TIPS
Get a Grip
In this month's issue of Information Security magazine, you learned strategies and approaches you can use to take control of mobile devices to ensure your organization's security. Now join us for a one-hour webcast on April 20 at noon ET, to learn about the business options for securing mobile wireless endpoints like smartphones and PDAs.
>> REGISTER TODAY
Then read our tip for advice on how to write policies that address mobile devices and their risks.
>> Policies for reducing mobile risk
In this month's issue, security expert Shon Harris helps make sense of the dizzying array of risk management methodologies and standards businesses have to choose from. For more risk assessment and management advice from Shon, check out our Ask the Experts feature. If you don't find the answers you need, you can submit your own questions.
>> READ SHON'S ASK THE EXPERT RESPONSES
>> ASK SHON A QUESTION
You learned about the differences between SSL 3.0 and TLS, as well as some uses for SSL you may not have considered. Now test your knowledge of Web application security by taking our quiz.
>> TAKE THE QUIZ
PING with Jane Scott Norris
In an interview with Information Security magazine, Jane Scott Norris, the Department of State's first CISO, offers some insight on what it takes to become a CISO.
>> READ THE INTERVIEW
|March 2006||February 2006||January 2006||December 2005||November 2005||October 2005|
|September 2005||August 2005||July 2005||June 2005||May 2005||April 2005|
Dig Deeper on Identity Theft and Data Security Breaches