Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on SearchSecurity.com.
Taking the pain out of policy management
In this month's issue of Information Security magazine, you read how to effectively set and manage policy, and the value in deploying automated software for ensuring consistent policy enforcement across systems. Join us for a discussion with Harris Weisman, information systems security manager at Chemung Canal Trust Company, on how to evaluate policy management tools, including those that claim to assist with regulatory compliance. Weisman will provide insight on how out-of-the-box policy management products work and how to customize policies for your organization. This webcast is live on Thursday, June 22 at noon ET and available on demand thereafter.
>> Register for Smart strategies for evaluating policy management tools today.
Manager's guide: Unified threat management
Is UTM a panacea for all that ills security teams, or is it just marketing hype? In this month's issue, consultant Joel Snyder helped you understand what UTM does, as well as the functionality that should be included in these products, critical performance issues and whether it's necessary to rip and replace existing firewalls. Now let Joel help you decide if UTM is right for your network in the 20-minute webcast, "Understanding unified threat management" from Lesson 3 of Intrusion Defense School.
>> View the webcast Understanding unified threat management
New endpoint security strategies: Understanding NAC, NAP and TNC
You read an in-depth comparison of Cisco's NAC, Microsoft's NAP, Trusted Computing Group's TNC, and other solutions that help secure endpoints and prevent mobile-based network threats. Now learn how unauthorized users gain network access, and how to block and secure untrusted endpoints in our new Network Access Control Learning Guide, created in partnership with our sister site, SearchWindowsSecurity.com.
>> Get the Network Access Control Learning Guide
The face of the new attacker
In this month's issue, you learned how hacker attacks are becoming increasingly sophisticated with targeted Trojans, rootkits and virtual machine-aware malware. Find out more about these and other new hacking tools and techniques, and get tactics for preventing them in our resource center.
>>Visit the hacking tools and techniques resource center
Avoiding a Web of trouble
In this month's issue, you learned about prevalent Web attack methods, such as cross-site scripting, path traversal attacks, SQL injection attacks and denial-of-service, and how attackers gather information about Web applications in order to exploit them. To learn more about these and other Web application attacks, and to get the latest tools and tactics to protect against them, check out our Learning Guide.
>> Get the Web Application Attacks Learning Guide
PING with Robert Garigue
In an interview with Information Security magazine, Robert Garigue, Bell Canada's chief security executive, discusses his transition from CISO at the Bank of Montreal and how a career change in the security world isn't really much of a change.
>> Read the interview
|May 2006||April 2006||March 2006||February 2006||January 2006||December 2005|
|November 2005||October 2005||September 2005||August 2005||July 2005||June 2005|
|May 2005||April 2005|
This was first published in June 2006