|
|

Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on SearchSecurity.com.
|
||||
Compliance Guide for Managers
You read about the biggest compliance challenges security managers are confronting and the tools, processes and policies they are using as they try to meet the demands of SOX. So, where does your organization stand when it comes to SOX compliance? Visit our SOX Security School and complete our SOX Scorecard to assess your organization's compliance efforts and identify your weaknesses.
>> GO TO THE SOX SCORECARD
>> GO TO SOX SECURITY SCHOOL
Secure from the Start
Architecture, design, coding and testing all offer opportunities to make your company's applications or services more secure. Planning for security in software development is essential. To be truly effective, you must start early in the process. The magazine armed you with a roadmap for secure software coding, including an overview of the skills programmers need to demonstrate and the types of products best suited to work in various development environments.
Download a checklist of secure coding tactics that can be printed and distributed to developers or used to check code.
>> GET THE CHECKLIST
Then join us for an hour-long live webcast on March 30, 2006, at noon ET to find out how vulnerable your applications are to attacks, and evaluate common tools and techniques to improve the security of your applications.
>> CLICK TO PREREGISTER
Unplugged
In this month's issue, you read an evaluation of four leading IDS/IPS products on their ability to detect and locate rogue APs, track and block possible attack sources, manage and enforce policy, interoperate with WLAN infrastructures, support 802.11a/b/g and Bluetooth, report and log, and their ease of use. Now expand your knowledge of wireless intrusion detection systems and learn how to secure your WLAN in our free Wireless Security Lunchtime Learning.
>> GO TO WIRELESS SECURITY LUNCHTIME LEARNING
Google Hacking
You learned how black hats are using Google's information-gathering power as a reconnaissance tool for attacks on corporate systems and data, and measures you can take to protect your business from such an attack. Now learn how to run automatic Google scans against your company's domain.
>> CLICK TO READ THE TIP
PING: William Pelgrin
In an interview with Information Security magazine, the director of New York's Office of Cyber Security and Critical Infrastructure Coordination explains how a mock phishing exercise against 10,000 state employees provided a measure of user awareness.
>> CLICK TO READ THE INTERVIEW
| HIGHLIGHTS ARCHIVE |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
| February 2006 | January 2006 | December 2005 | November 2005 | October 2005 | September 2005 |
![]() |
![]() |
![]() |
![]() |
![]() |
|
| August 2005 | July 2005 | June 2005 | May 2005 | April 2005 |
This was first published in February 2006
Security Management Strategies for the CIO











Join the conversationComment
Share
Comments
Results
Contribute to the conversation