Looking for something else?
Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on SearchSecurity.com.
In this month's issue, you met the leading security practitioners in seven different markets and learned the secrets to their success. Now, hear how they expect the security industry to look five years from now. From emerging threats to new technology standards, these luminaries offer insight into where our business is headed.
>> READ THEIR FORECASTS
This month's article on the SQL Server 2005 filled you in on the new security features included in the upcoming release, including security management enhancements and login lockdowns. If you've got questions about securing SQL Server or any of your applications, ask SearchSecurity.com expert Michael Cobb, founder and managing director of Cobweb Applications Ltd.
>> CLICK TO ASK YOUR SQL SERVER QUESTION
Also, learn how to prevent SQL injections. Read this technical tip to find out how. >> READ THE TIP
The Rise of "Dataflation"
Columnist Stephen Cobb thinks we're suffering from a data privacy crisis, something he calls "dataflation." As identity theft victimizes more people, consumers lose confidence in doing business online. The economic impact, Cobb argues, could hurt the economy more than traditional inflation. In this extended version of his Information Security column, Cobb further explores this concept of "dataflation" and its impact on businesses' bottom lines.
>>CLICK TO READ COBB'S COMPLETE COLUMN
PING: Jennifer Granick
In an interview with Information Security, Jennifer Granick, executive director of the Center for Internet and Society, sounded off on responsible disclosure and the recent furor over Michael Lynn publicizing a Cisco exploit. Read the complete interview online. >>CLICK FOR THE FULL PING
|E-mail Security Decisions
Attend this FREE seminar in the city of your choice -- Boston, Toronto or Chicago -- and gain proven infrastructure hardening techniques combined with practical strategies focused on the most urgent e-mail security threats (phishing, spyware, denial of service attacks and more). With four key sessions, this intensive 1-day training event guarantees unbiased expertise without any vendor spin from the podium. You gain little-known e-mail security tips, tactics and techniques from two of the industry's leading e-mail security authorities, Dr. Joel Snyder and Lee Benjamin.
| September 2005