
Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on SearchSecurity.com.
|
|
Information Security magazine asked leading security practitioners, researchers, vendors and consultants to share the best piece of advice that's helped them do their security jobs better. But the good advice goes beyond what you've already read. See what some other security luminaries cite as the guiding philosophies behind their work. In this SearchSecurity.com companion piece, you'll hear from more top security pros.
>> READ MORE GOOD ADVICE
|
||||
E-mail Security Bake-off
Information Security magazine's testers compared the efficiency and effectiveness of five e-mail security appliances. Now that you have a solid understanding of these products' performance, learn more about securing the most exploited application in the enterprise. Our multi-media E-mail Security School will arm you with tactics for fortifying SMTP-based e-mail, fending off spam and viruses, and setting effective e-mail usage policies.
>>ATTEND OUR FREE E-MAIL SECURITY SCHOOL
Also, save your e-mail servers from dealing with unsolicited mail by using a spam appliance. Read this technical tip to find out how.
>> READ THE TIP
Must-Have Antihacker Tools
In this month's issue, security expert Ed Skoudis, author of the forthcoming book "Counter Hack," lists the five most interesting new hacker tools that every security manager should add to his kit. SearchSecurity.com has created a guide of valuable resources containing in-depth information for protecting your network from hackers. >>CHECK OUT THE GUIDE
RELATED INFORMATION:
>> Would you ever hire a hacker? Our editors debate the pros and cons.
CLICK TO READ THE ARTICLE>> Share your thoughts on whether it's a good idea to put a hacker on your payroll.
GO TO THE FORUM
| Information Security Decisions -- October 2005 Information Security Decisions arms you with the expert advice it takes to tackle today's mission-critical security objectives--no matter how rampant user ignorance or noncompliance runs throughout your organization. Governance and compliance must be addressed. Cost-saving strategies and smarter purchasing decisions must be made. Business units can no longer ignore security risks. And safeguarding your entire network is paramount. Security is your business – showing you how to secure the future of that business is ours. Apply today to qualify for free admission. |
HIGHLIGHTS ARCHIVES |
|
August 2005 July 2005 June 2005 May 2005 April 2005 |
This was first published in August 2005
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation