|
|
Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on SearchSecurity.com.
|
||||
Vulnerability management services
This month's issue of Information Security magazine helped you decide if outsourcing vulnerability management services is right for your organization. Beginning Tuesday, Aug. 29, listen to an on-demand webcast as Burton Group senior analyst Diana Kelley provides smart shopper advice for enterprises looking for a vulnerability management service. Kelley will review best practices for ensuring accountability, how to effectively work with a VM service provider, essentials to include in every SLA and more.
>> Register for 10 steps to effective vulnerability management services
PING with Heidi Kujawa
In this Q&A with Information Security magazine, In an exclusive interview with Information Security magazine, Heidi Kujawa, director of enterprise architecture services for Sony Pictures Entertainment, explains how combatting piracy takes more than just keeping bootleggers out of the theaters.
>> Read the interview with Heidi Kujawa
Manager's Guide: Simplifying the complexity of identity management
In this month's issue, you learned how SSO products can help meet regulations, improve the user experience and reduce help desk calls. Now get a listing of available products to help you determine which SSO product would best suit your organization.
>> Download a PDF of single sign-on products
More from the Manager's Guide:
Tips for Windows authentication
As Windows is widely deployed in the enterprise, learn about some options for authenticating Windows with enterprise single sign-on solutions.
>> Read about authenticating Windows with enterprise single sign-on
Beyond HIPAA and GLBA
New regulations such as FFIEC and HSPD 12 are forcing organizations to scramble for authentication and identity management options.
>> Read about authentication requirements for FFIEC and HSPD 12 compliance
Risk-based authentication
Risk-based authentication is becoming a popular alternative for businesses that need to securely interact with their customers.
>> Read about the potential and pitfalls of risk-based authentication
| HIGHLIGHTS ARCHIVES |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
| July 2006 | June 2006 | May 2006 | April 2006 | March 2006 | February 2006 |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
| January 2006 | December 2005 | November 2005 | October 2005 | September 2005 | August 2005 |
![]() |
![]() |
![]() |
![]() |
||
| July 2005 | June 2005 | May 2005 | April 2005 |
This was first published in September 2006
Security Management Strategies for the CIO
















Join the conversationComment
Share
Comments
Results
Contribute to the conversation