Looking for something else?
Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on SearchSecurity.com.
Successful SIMs deployment
This month's issue of Information Security weighs the pros and cons of security information management systems (SIMs). Four case studies illustrate the different roadblocks security managers can encounter during and after a SIMs deployment, and explain how those hurdles were overcome. In each instance, visibility and control over reams of log data were gained, and regulatory compliance pains subsided. On Sept. 21 at noon, SANS instructor Lenny Zeltser will do a live webcast, presenting five steps toward a successful SIMs deployment.
>> Attend this on-demand webcast
Guarding the Gate: VPN Deployment Strategies
Also this month, you read a comparative review of five SSL VPNs that examined the respective products' management and control capabilities, client and applications support, and authentication and access control. Now view this July webcast on VPN deployment strategies.
>> Attend Guarding the Gate: VPN Deployment Strategies
Sharpen your business skills
More security managers are headed back to school, in pursuit of an MBA, or at a minimum, more business training. If you're considering sharpening your business chops, start with some expert advice on careers, training and certifications.
>> Visit our Information Security Careers, Training and Certifications resource center
Solve your encryption woes
Encryption scrambles your data and keeps it hidden from intruders, but it also blinds your network IDS and IPS protection. If you've run across this problem, talk to expert Joel Dubin about it.
>> Submit your encryption questions to Joel Dubin
PING with Christopher Ray
In this exclusive interview with Information Security magazine, Christopher Ray, second vice president of information security for insurance provider AFLAC, explains why endpoint security is more than device integrity checks, for example, it's a combination of traditional security solutions, plus a dash of policy and procedures.
>> Read the interview with Christopher Ray
|August 2006||July 2006||June 2006||May 2006||April 2006||March 2006|
|February 2006||January 2006||December 2005||November 2005||October 2005||September 2005|
|August 2005||July 2005||June 2005||May 2005||April 2005|
Dig Deeper on Malware, virus, Trojan and spyware protection and removal