Monthly Magazine Highligh

More from SearchSecurity -- May 2005

Welcome to's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on

Keeping the Oil & Data Flowing
by Mike Mimoso
Oil giant ChevronTexaco has baked risk management into each of its business processes and made data protection an integral part of its practices. It's easy to understand why since the company stores more than 500 terabytes of technical data around oil field exploration activities and generates 350 terabytes each year for seismic projects. Part of ChevronTexaco's strategy involves consolidating its data management policies. In this on-demand webcast, hear how you can find trigger points that indicate your corporate security policies should be updated and why risk assessment results are essential for developing sound policies.

>> An SQL injection attack is a major threat to backend data. Get tactics for protecting your sites and information.

>> SearchSecurity's monthly Risk Management Strategies newsletter arms you with real-world techniques for enterprise risk management, metrics and measurement, business continuity, top-line security policies, procedures and guidelines, and standards adoption. Sign up today.

Command, Control, Comply: The Evolution of Security Managment Systems

Learn about the essential characteristics of the latest Security Information Management solutions (SIMs) and how the technology has developed in this expert webcast.

Perspectives: Linux v. Windows
Is Windows really easier to lock down than Linux? A controversial report from Security Innovation has a lot of IT professionals talking. Read what your peers have to say and then share your thoughts on whether the Penguin plays second fiddle when it comes to security.

>> Click to read security consultant Ira Winkler's analysis

Ping: MassMutual's Bruce Bonsall
MassMutual Financial Group CISO Bruce Bonsall relays the process his organization uses to ensure that security is factored into every IT project. Read how Bonsall learned to speak in a language business folks could understand.

Identity Management: Managing Federated Relationships
Federated identity management simplifies and protects the online registration and access control process for consumers and extranet partners. SAML is the protocol for leveraging federated relationships. Information Security contributor Dick Mackey goes online with a webcast that demystifies SAML. He also shares technical advice on the dangers of using XML and the extent to which new devices can help you filter out XML-based attacks. >> CLICK TO PREREGISTER FOR THE WEBCAST

>> Learn more about keeping XML secure with our XML Security Learning Guide.
>> Read about the progress in ratifying security standards like SAML 2.0.

E-mail Security School

Learn tactics for securing your e-mail systems in this three lesson course led by our guest instructor, Joel Snyder. Participants who register with a valid e-mail address and attend all three course webcasts will receive a certificate of completion from In addition, through our agreement with (ISC)², all CISSPs and SSCPs can earn 1 CPE credit per lesson webcast.
April 2005

This was first published in April 2005

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: