Monthly Magazine Highligh

More from SearchSecurity -- August 2005



Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on SearchSecurity.com.



A Safe Bet?
by Paul Proctor
In this month's issue, you learned how anomaly detection promises to thwart zero-day attacks and malicious activity by flagging deviations from known, good network behavior. Now that you have a better idea of how maturing anomaly detection technology is being used to augment conventional signature-based intrusion detection and prevention, learn more about maximizing intrusion detection and prevention.

Register for an August 24 webcast to see how logs and the anomalous activity they document can shed light on the state of a business' security. You'll also get tactics for wisely using an intrusion-detection and/or prevention system for proactive vulnerability management. >> PREREGISTER FOR THE WEBCAST

RELATED INFORMATION:
>> See why the time is right to deploy an IPS. CLICK TO READ THIS TIP

>> Check out a great guide full of valuable resources on thwarting hackers. CLICK TO GET THE GUIDE

Earn free CPE credits in
Web Security School

Don't leave your enterprise open to attack! Attend these on-demand webcasts and learn how to protect your network. Lessons include:  Insider's guide to Web server security, Web attacks and how to defeat them, and Locking down your Web applications.

Paper or PKI?
This month's article told you how the pharmaceutical industry is using PKI to cut costs from long, expensive drug development cycles. SearchSecurity interviewed the fathers of the Diffie-Hellman key exchange, a major advancement in PKI. Read how they view current threats and where they think the technology that they advanced is now headed.
>>READ A CONVERSATION WITH WHITFIELD DIFFIE

>>READ A CONVERSATION WITH MARTIN HELLMAN



Ping: Chrisan Herrod
Read the full interview with the CSO of the Securities and Exchange Commission, who explains how private and public sectors can work together to bring sanity to the compliance process.
>>READ THE FULL INTERVIEW

Boot Camp
When it comes to security, end users can undoubtedly be the weakest link. That's why many organizations have found centralizing security training to be successful. Policy guru Charles Cresson Wood shares some tips for keeping your training and awareness efforts consistent.
>>CLICK TO READ THE TIPS

Switching Lanes
Information Security magazine armed you with strategies for using VLANs. But make sure you're not opening your systems up to possible attack. Learn how to secure a VLAN to prevent the popular VLAN hopping attack or an Address Resolution Protocol attack.
>>CLICK TO READ THE TIP
RELATED INFORMATION:
>> Get advice on the value of segmenting a LAN to isolate malware. CLICK TO READ THE TIP

Information Security Decisions -- October 2005

Information Security Decisions arms you with the expert advice it takes to tackle today's mission-critical security objectives--no matter how rampant user ignorance or noncompliance runs throughout your organization. Governance and compliance must be addressed. Cost-saving strategies and smarter purchasing decisions must be made. Business units can no longer ignore security risks. And safeguarding your entire network is paramount. Security is your business – showing you how to secure the future of that business is ours. Apply today to qualify for free admission.
HIGHLIGHTS ARCHIVES
July 2005
June 2005
May 2005
April 2005

This was first published in July 2005

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: