More from SearchSecurity -- September 2005

More from the September 2005 issue of Information Security magazine.



Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on SearchSecurity.com.



Best Advice
Information Security magazine asked leading security practitioners, researchers, vendors and consultants to share the best piece of advice that's helped them do their security jobs better. But the good advice goes beyond what you've already read. See what some other security luminaries cite as the guiding philosophies behind their work. In this SearchSecurity.com companion piece, you'll hear from more top security pros.
>> READ MORE GOOD ADVICE



 Secrets to Using IDS and IPS Effectively

In this on-demand webcast, expert Jeffrey Posluns explains how logs and the anomalous activity they document can shed light on the state of a business' security and be used to enhance an intrusion detection and/or prevention system for proactive vulnerability management. 
View this webcast


E-mail Security Bake-off
Information Security magazine's testers compared the efficiency and effectiveness of five e-mail security appliances. Now that you have a solid understanding of these products' performance, learn more about securing the most exploited application in the enterprise. Our multi-media E-mail Security School will arm you with tactics for fortifying SMTP-based e-mail, fending off spam and viruses, and setting effective e-mail usage policies.
>> ATTEND OUR FREE E-MAIL SECURITY SCHOOL

Also, save your e-mail servers from dealing with unsolicited mail by using a spam appliance. Read this technical tip to find out how.
>> READ THE TIP


Must-Have Antihacker Tools
In this month's issue, security expert Ed Skoudis, author of the forthcoming book "Counter Hack," lists the five most interesting new hacker tools that every security manager should add to his kit. SearchSecurity.com has created a guide of valuable resources containing in-depth information for protecting your network from hackers. >>CHECK OUT THE GUIDE

RELATED INFORMATION:
>> Would you ever hire a hacker? Our editors debate the pros and cons.
CLICK TO READ THE ARTICLE

>> Share your thoughts on whether it's a good idea to put a hacker on your payroll.
GO TO THE FORUM



Information Security Decisions -- October 2005

Information Security Decisions arms you with the expert advice it takes to tackle today's mission-critical security objectives--no matter how rampant user ignorance or noncompliance runs throughout your organization. Governance and compliance must be addressed. Cost-saving strategies and smarter purchasing decisions must be made. Business units can no longer ignore security risks. And safeguarding your entire network is paramount. Security is your business – showing you how to secure the future of that business is ours. Apply today to qualify for free admission.
HIGHLIGHTS ARCHIVES
August 2005
July 2005
June 2005
May 2005
April 2005
This was first published in August 2005

Dig deeper on Security Resources

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

This Content Component encountered an error
Close