Monthly Magazine Highligh

More from SearchSecurity -- April 2006

April 06 Cover

Welcome to's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on


Intrusion Defense School
Attend our Intrusion Defense School led by guest instructor Joel Snyder, and learn how to implement various technologies, such as antivirus, UTM and IDS/IPS, to harden the network perimeter. CISSPs and SSCPs who attend our series of 20-minute webcasts are eligible to earn 1 CPE credit from (ISC)².
Go to Intrusion Defense School 
The Merits of Intrusion Defense
Intrusion defense programs are often touted for their ability to guard against today's evolving threats. Based on an exclusive survey of IT professionals, the news team takes a look at real-world intrusion defense programs and which vendors are considered most valuable.
Read "Intruder Alert"
News When You Want It
If you find it difficult to stay current on the latest developments in the infosec industry, then tune into our Security Wire Weekly audio broadcasts. Produced by's award-winning news team, you can listen each week on your PC or favorite mobile device when and where it's convenient for you. Listen to our security podcasts

Security Survivor All-Stars
You read five case studies examining the breaches at ChoicePoint, Georgia DMV, DSW Shoe Retail and Lexis-Nexis, and learned how they retooled their procedures, processes, policies and technologies to avoid making headlines again. Now read more tips for keeping your customers' data secure.

Get a Grip
In this month's issue of Information Security magazine, you learned strategies and approaches you can use to take control of mobile devices to ensure your organization's security. Now join us for a one-hour webcast on April 20 at noon ET, to learn about the business options for securing mobile wireless endpoints like smartphones and PDAs.

Then read our tip for advice on how to write policies that address mobile devices and their risks.
>> Policies for reducing mobile risk

Alphabet Soup
In this month's issue, security expert Shon Harris helps make sense of the dizzying array of risk management methodologies and standards businesses have to choose from. For more risk assessment and management advice from Shon, check out our Ask the Experts feature. If you don't find the answers you need, you can submit your own questions.

Transit Safety
You learned about the differences between SSL 3.0 and TLS, as well as some uses for SSL you may not have considered. Now test your knowledge of Web application security by taking our quiz.

PING with Jane Scott Norris
In an interview with Information Security magazine, Jane Scott Norris, the Department of State's first CISO, offers some insight on what it takes to become a CISO.

March 2006 February 2006 January 2006 December 2005 November 2005 October 2005
September 2005 August 2005 July 2005 June 2005 May 2005 April 2005

This was first published in March 2006

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: