More from SearchSecurity -- February 2006

Highlights from the February 2006 issue of Information Security Magazine.



Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on SearchSecurity.com.


THIS MONTH ON SEARCHSECURITY.COM

SOX Security School
Learn how to meet Sarbanes-Oxley's ongoing demands in SearchSecurity's SOX Security School -- A comprehensive look at ongoing security compliance, with guest instructor Richard Mackey, Principal, SystemExperts.
Go to SOX Security School
Securing backups
Learn how to keep your backup servers from falling prey to hack attacks in this month's issue of Risk Management Strategies. Then attend our live webcast on Feb. 23 at Noon ET to learn the four specific threats your backup system poses and how to mitigate them.
VIEW THIS WEBCAST
Daily Coverage of RSA Conference 2006
The SearchSecurity and Information Security editorial teams will be in San Jose this month to bring you exclusive coverage of key issues, product announcements and research findings. Pick up our Show Daily at the conference or visit SearchSecurity.com/RSA06 for additional news and podcasts.
The Merits of Intrusion Defense
Watch for our three-part series on the value of intrusion defense products in the enterprise. Based on exclusive research, the SearchSecurity.com news team will analyze the value of IDS vs. IPS and whether IPS technology is evolving at a sufficient pace.

Stopping the Next Heist
A recent study found that data security breaches are the most widely reported security incidents in the media – outpacing virus outbreaks and hacks. Far too often, companies ignore security implications when making data backup and recovery purchases. In this month's issue, we explored the evolving product landscape where storage and security intersect, investigating advances in backup technology, encryption options for online and offline data, and the varying security options for data in backups or archives.

Now, join us for an hour-long webcast on Feb. 23 at noon EST that details the four specific threats that your backup system poses and details the operational changes that information security staff should make to lock down backed up and archived data.
>> VIEW THIS WEBCAST



Game Over?
Nearly every week it seems one vendor is snapping up another. It's one of the ongoing trends we're following in our resource center devoted to the information security industry. Here, you can keep track of market developments, mergers and emerging technologies.
>> CLICK TO READ THE LATEST INDUSTRY NEWS



PING: Yan Noblot
In an interview with Information Security magazine, Yan Nablot, IT security manager for this year's Winter Olympics in Turin, Italy, offers some insight on what it takes to keep a global event secure.
>> CLICK TO READ THE INTERVIEW



Owning the C-suite
If you've found yourself on the losing end of a few too many battles, and security is suffering because of a lack of support from top executives, a bit of positive social engineering may be just the thing. In this article, Shawn Moyer, CISO of Agura Digital Security, offers a few weapons of influence to help you talk to the C-suite.
>> CLICK TO READ THE ARTICLE








HIGHLIGHTS ARCHIVES
January 2006 December 2005 November 2005 October 2005 September 2005 August 2005
July 2005 June 2005 May 2005 April 2005
This was first published in February 2006

Dig deeper on Security Industry Market Trends, Predictions and Forecasts

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

This Content Component encountered an error

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close