Monthly Magazine Highligh

More from SearchSecurity -- September 2005



Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on SearchSecurity.com.



Best Advice
Information Security magazine asked leading security practitioners, researchers, vendors and consultants to share the best piece of advice that's helped them do their security jobs better. But the good advice goes beyond what you've already read. See what some other security luminaries cite as the guiding philosophies behind their work. In this SearchSecurity.com companion piece, you'll hear from more top security pros.
>> READ MORE GOOD ADVICE



 Secrets to Using IDS and IPS Effectively

In this on-demand webcast, expert Jeffrey Posluns explains how logs and the anomalous activity they document can shed light on the state of a business' security and be used to enhance an intrusion detection and/or prevention system for proactive vulnerability management. 
View this webcast


E-mail Security Bake-off
Information Security magazine's testers compared the efficiency and effectiveness of five e-mail security appliances. Now that you have a solid understanding of these products' performance, learn more about securing the most exploited application in the enterprise. Our multi-media E-mail Security School will arm you with tactics for fortifying SMTP-based e-mail, fending off spam and viruses, and setting effective e-mail usage policies.
>>ATTEND OUR FREE E-MAIL SECURITY SCHOOL

Also, save your e-mail servers from dealing with unsolicited mail by using a spam appliance. Read this technical tip to find out how.
>> READ THE TIP


Must-Have Antihacker Tools
In this month's issue, security expert Ed Skoudis, author of the forthcoming book "Counter Hack," lists the five most interesting new hacker tools that every security manager should add to his kit. SearchSecurity.com has created a guide of valuable resources containing in-depth information for protecting your network from hackers. >>CHECK OUT THE GUIDE

RELATED INFORMATION:
>> Would you ever hire a hacker? Our editors debate the pros and cons.
CLICK TO READ THE ARTICLE

>> Share your thoughts on whether it's a good idea to put a hacker on your payroll.
GO TO THE FORUM



Information Security Decisions -- October 2005

Information Security Decisions arms you with the expert advice it takes to tackle today's mission-critical security objectives--no matter how rampant user ignorance or noncompliance runs throughout your organization. Governance and compliance must be addressed. Cost-saving strategies and smarter purchasing decisions must be made. Business units can no longer ignore security risks. And safeguarding your entire network is paramount. Security is your business – showing you how to secure the future of that business is ours. Apply today to qualify for free admission.
HIGHLIGHTS ARCHIVES
August 2005
July 2005
June 2005
May 2005
April 2005

This was first published in August 2005

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: