
Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on SearchSecurity.com.
|
|
by Paul Proctor
In this month's issue, you learned how anomaly detection promises to thwart zero-day attacks and malicious activity by flagging deviations from known, good network behavior. Now that you have a better idea of how maturing anomaly detection technology is being used to augment conventional signature-based intrusion detection and prevention, learn more about maximizing intrusion detection and prevention.
Register for an August 24 webcast to see how logs and the anomalous activity they document can shed light on the state of a business' security. You'll also get tactics for wisely using an intrusion-detection and/or prevention system for proactive vulnerability management. >> PREREGISTER FOR THE WEBCAST
RELATED INFORMATION:
>> See why the time is right to deploy an IPS. CLICK TO READ THIS TIP
>> Check out a great guide full of valuable resources on thwarting hackers. CLICK TO GET THE GUIDE
|
||||
This month's article told you how the pharmaceutical industry is using PKI to cut costs from long, expensive drug development cycles. SearchSecurity interviewed the fathers of the Diffie-Hellman key exchange, a major advancement in PKI. Read how they view current threats and where they think the technology that they advanced is now headed.
>>READ A CONVERSATION WITH WHITFIELD DIFFIE
Ping: Chrisan Herrod
Read the full interview with the CSO of the Securities and Exchange Commission, who explains how private and public sectors can work together to bring sanity to the compliance process.
>>READ THE FULL INTERVIEW
Boot Camp
When it comes to security, end users can undoubtedly be the weakest link. That's why many organizations have found centralizing security training to be successful. Policy guru Charles Cresson Wood shares some tips for keeping your training and awareness efforts consistent.
>>CLICK TO READ THE TIPS
Switching Lanes
Information Security magazine armed you with strategies for using VLANs. But make sure you're not opening your systems up to possible attack. Learn how to secure a VLAN to prevent the popular VLAN hopping attack or an Address Resolution Protocol attack.
>>CLICK TO READ THE TIP
RELATED INFORMATION:
>> Get advice on the value of segmenting a LAN to isolate malware. CLICK TO READ THE TIP
|
Information Security Decisions -- October 2005 Information Security Decisions arms you with the expert advice it takes to tackle today's mission-critical security objectives--no matter how rampant user ignorance or noncompliance runs throughout your organization. Governance and compliance must be addressed. Cost-saving strategies and smarter purchasing decisions must be made. Business units can no longer ignore security risks. And safeguarding your entire network is paramount. Security is your business – showing you how to secure the future of that business is ours. Apply today to qualify for free admission. |
HIGHLIGHTS ARCHIVES |
|
July 2005 June 2005 May 2005 April 2005 |
This was first published in July 2005
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation