More from SearchSecurity -- March 2006

Highlights from the February 2006 issue of Information Security Magazine.



Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on SearchSecurity.com.


THIS MONTH ON SEARCHSECURITY.COM

Wireless Security Lunchtime Learning
Spend your lunch hour learning the essentials of wireless LAN security. Four 20-minute webcasts, supporting technical tips and quizzes provide comprehensive coverage of the issues corporations face regarding WLAN security, whether they choose to deploy a WLAN infrastructure or prohibit WLAN access altogether.
GO TO WIRELESS SECURITY LUNCHTIME LEARNING
How to protect your business
Like pen testing, Google hacking is useful both for the attacker and the potential victim. Learn how to use Google hacking to discover sensitive information about your business that's exposed on the Internet.
Free online training
SearchSecurity.com offers a variety of free courses to help you meet the increasingly challenging job of keeping your enterprise secure and compliant. Visit our Security School Course Catalog to access previous courses and get a sneak peak at future courses.
Tools for securing the SDLC
Join us on March 30 at noon ET when Michael Jordan, a SystemExperts consultant, will discuss the key steps of the Software Development Lifecycle, and evaluate tools and techniques to improve the security of applications.
Preregister today

Compliance Guide for Managers
You read about the biggest compliance challenges security managers are confronting and the tools, processes and policies they are using as they try to meet the demands of SOX. So, where does your organization stand when it comes to SOX compliance? Visit our SOX Security School and complete our SOX Scorecard to assess your organization's compliance efforts and identify your weaknesses.
>> GO TO THE SOX SCORECARD
>> GO TO SOX SECURITY SCHOOL


Secure from the Start
Architecture, design, coding and testing all offer opportunities to make your company's applications or services more secure. Planning for security in software development is essential. To be truly effective, you must start early in the process. The magazine armed you with a roadmap for secure software coding, including an overview of the skills programmers need to demonstrate and the types of products best suited to work in various development environments.

Download a checklist of secure coding tactics that can be printed and distributed to developers or used to check code.
>> GET THE CHECKLIST

Then join us for an hour-long live webcast on March 30, 2006, at noon ET to find out how vulnerable your applications are to attacks, and evaluate common tools and techniques to improve the security of your applications.
>> CLICK TO PREREGISTER

Unplugged
In this month's issue, you read an evaluation of four leading IDS/IPS products on their ability to detect and locate rogue APs, track and block possible attack sources, manage and enforce policy, interoperate with WLAN infrastructures, support 802.11a/b/g and Bluetooth, report and log, and their ease of use. Now expand your knowledge of wireless intrusion detection systems and learn how to secure your WLAN in our free Wireless Security Lunchtime Learning.
>> GO TO WIRELESS SECURITY LUNCHTIME LEARNING

Google Hacking
You learned how black hats are using Google's information-gathering power as a reconnaissance tool for attacks on corporate systems and data, and measures you can take to protect your business from such an attack. Now learn how to run automatic Google scans against your company's domain.
>> CLICK TO READ THE TIP


PING: William Pelgrin
In an interview with Information Security magazine, the director of New York's Office of Cyber Security and Critical Infrastructure Coordination explains how a mock phishing exercise against 10,000 state employees provided a measure of user awareness.
>> CLICK TO READ THE INTERVIEW




HIGHLIGHTS ARCHIVE
February 2006 January 2006 December 2005 November 2005 October 2005 September 2005
August 2005 July 2005 June 2005 May 2005 April 2005
This was first published in February 2006

Dig deeper on Security Industry Market Trends, Predictions and Forecasts

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close