Monthly Magazine Highligh

More from SearchSecurity -- February 2006

Welcome to's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on


SOX Security School
Learn how to meet Sarbanes-Oxley's ongoing demands in SearchSecurity's SOX Security School -- A comprehensive look at ongoing security compliance, with guest instructor Richard Mackey, Principal, SystemExperts.
Go to SOX Security School
Securing backups
Learn how to keep your backup servers from falling prey to hack attacks in this month's issue of Risk Management Strategies. Then attend our live webcast on Feb. 23 at Noon ET to learn the four specific threats your backup system poses and how to mitigate them.
Daily Coverage of RSA Conference 2006
The SearchSecurity and Information Security editorial teams will be in San Jose this month to bring you exclusive coverage of key issues, product announcements and research findings. Pick up our Show Daily at the conference or visit for additional news and podcasts.
The Merits of Intrusion Defense
Watch for our three-part series on the value of intrusion defense products in the enterprise. Based on exclusive research, the news team will analyze the value of IDS vs. IPS and whether IPS technology is evolving at a sufficient pace.

Stopping the Next Heist
A recent study found that data security breaches are the most widely reported security incidents in the media – outpacing virus outbreaks and hacks. Far too often, companies ignore security implications when making data backup and recovery purchases. In this month's issue, we explored the evolving product landscape where storage and security intersect, investigating advances in backup technology, encryption options for online and offline data, and the varying security options for data in backups or archives.

Now, join us for an hour-long webcast on Feb. 23 at noon EST that details the four specific threats that your backup system poses and details the operational changes that information security staff should make to lock down backed up and archived data.

Game Over?
Nearly every week it seems one vendor is snapping up another. It's one of the ongoing trends we're following in our resource center devoted to the information security industry. Here, you can keep track of market developments, mergers and emerging technologies.

PING: Yan Noblot
In an interview with Information Security magazine, Yan Nablot, IT security manager for this year's Winter Olympics in Turin, Italy, offers some insight on what it takes to keep a global event secure.

Owning the C-suite
If you've found yourself on the losing end of a few too many battles, and security is suffering because of a lack of support from top executives, a bit of positive social engineering may be just the thing. In this article, Shawn Moyer, CISO of Agura Digital Security, offers a few weapons of influence to help you talk to the C-suite.

January 2006 December 2005 November 2005 October 2005 September 2005 August 2005
July 2005 June 2005 May 2005 April 2005

This was first published in February 2006

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: