|
|

Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on SearchSecurity.com.
|
||||
Stopping the Next Heist
A recent study found that data security breaches are the most widely reported security incidents in the media – outpacing virus outbreaks and hacks. Far too often, companies ignore security implications when making data backup and recovery purchases. In this month's issue, we explored the evolving product landscape where storage and security intersect, investigating advances in backup technology, encryption options for online and offline data, and the varying security options for data in backups or archives.
Now, join us for an hour-long webcast on Feb. 23 at noon EST that details the four specific threats that your backup system poses and details the operational changes that information security staff should make to lock down backed up and archived data.
>> VIEW THIS WEBCAST
Game Over?
Nearly every week it seems one vendor is snapping up another. It's one of the ongoing trends we're following in our resource center devoted to the information security industry. Here, you can keep track of market developments, mergers and emerging technologies.
>> CLICK TO READ THE LATEST INDUSTRY NEWS
PING: Yan Noblot
In an interview with Information Security magazine, Yan Nablot, IT security manager for this year's Winter Olympics in Turin, Italy, offers some insight on what it takes to keep a global event secure.
>> CLICK TO READ THE INTERVIEW
Owning the C-suite
If you've found yourself on the losing end of a few too many battles, and security is suffering because of a lack of support from top executives, a bit of positive social engineering may be just the thing. In this article, Shawn Moyer, CISO of Agura Digital Security, offers a few weapons of influence to help you talk to the C-suite.
>> CLICK TO READ THE ARTICLE
| HIGHLIGHTS ARCHIVES |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
| January 2006 | December 2005 | November 2005 | October 2005 | September 2005 | August 2005 |
![]() |
![]() |
![]() |
![]() |
||
| July 2005 | June 2005 | May 2005 | April 2005 |
This was first published in February 2006
Security Management Strategies for the CIO










Join the conversationComment
Share
Comments
Results
Contribute to the conversation