Monthly Magazine Highligh

More from SearchSecurity -- January 2006



Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on SearchSecurity.com.


THIS MONTH ON SEARCHSECURITY.COM

Technical Guide: Vulnerability scanning with Nessus
Learn how to use Nessus in the enterprise. Our expert takes you through the process step-by-step, from implementing and configuring the open source vulnerability scanner to building an enterprise reporting system.
AVAILABLE JAN. 24, 2006


Security Wire Weekly Podcasts: News when you want it
Security Wire Weekly is an audio broadcast featuring the latest security news. Produced by SearchSecurity.com's award-winning news team, you can listen each week on your PC or favorite mobile device.
LISTEN TO OUR PODCASTS
Webcast: Securing VoIP: An insider's look at the tools and tactics
This webcast has been cancelled. We apologize for any inconvenience this may have caused.

Don't Spring a Leak
Whether employees are acting maliciously or just carelessly, insiders account for the majority of customer data and intellectual property breaches. In our January cover story, we explored technology options for keeping confidential inside information secure. Now, we zero in on a new breed of host-based content monitoring tools that monitors individual machines to ensure that employee behavior adheres to corporate security policy. Join us for a webcast on Jan. 19 at noon EST to see how these products work. You'll learn how they assess where confidential information resides, prevent confidential information from leaving the network and can be centrally managed. (The webcast is available on demand after it debuts live.)
>> PREREGISTER HERE

Peak of Security
Internet Explorer's poor reputation for security has motivated many to migrate to other browsers. But IE 7.0, now in beta, promises to stave off cross-site scripting and attacks that exploit URL parsing, improve control over ActiveX, and add an antiphishing blacklist. This month, we pitted IE's new security features against its chief browser competitors, Netscape and Firefox. Now, read about the security features in Opera, another contender in the browser wars.
>> CLICK TO READ THIS TIP

Mining Netflow
Netflow data can be used to discover all sorts of harmful traffic, including spam Trojans in e-mail traffic, compromises on a firewalled server cluster, spyware infestation due to outbound traffic, and more. In Information Security magazine, you saw how to mine Netflow data to create homegrown anomaly detection. Now arm yourself with more tactics for detecting and preventing intrusions with SearchSecurity.com's learning guide.
>> CLICK TO GET THIS GUIDE

PING: Marcus Sachs
In an interview with Information Security magazine, Marcus Sachs, a deputy director in SRI's Computer Science Laboratory, explains what it means to support SRI's Washington D.C. operations of the U.S. Department of Homeland Security's Cyber Security R&D Center, and how public and private enterprises play an important role in the process.
>> CLICK TO READ THE INTERVIEW





HIGHLIGHTS ARCHIVES
December 2005 November 2005 October 2005 September 2005 August 2005 July 2005
June 2005 May 2005 April 2005

This was first published in January 2006

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: