Monthly Magazine Highligh

More from SearchSecurity.com -- June 2007



This month, Information Security magazine examines the role of security integrators and consultants, and helps you manage relationships with outside help.

In this exclusive for SearchSecurity.com, ISM Features Editor Marcia Savage asks experts about the value your organization should place on an integrator's credentials and how that should influence your selection process.


Online exclusives

Keeping data safe
In our brand-new Data Protection Security School, a trio of top instructors will teach you how to avoid disastrous data leaks, master the finer points of data storage strategy and demystify data encryption. Learn the tools and tactics you need to successfully secure data throughout the enterprise -- whether in motion or at rest.
>>GO TO DATA PROTECTION SECURITY SCHOOL

Webcast: Super SIMs
Stop ignoring that ever-growing pile of network logs. In this webcast, security luminary Joel Snyder examines security information management, product roadmaps and underlying aspects of SIMs that may provide surprising benefits.
>>REGISTER FOR OUR SIMS WEBCAST WITH JOEL SNYDER

Next-generation authentication
In this brand-new lesson in our Identity and Access Management Security School lesson, Burton Group's Mark Diodati outlines the latest and greatest in authentication technology, and identifies what offerings makes sense for your organization's needs.
>>VISIT MARK DIODATI'S IAM SCHOOL LESSON

Podcast: Security Squad
SearchSecurity.com editors discuss whether Microsoft should abandon Patch Tuesday, whether blogging is a security threat to corporate systems, the state of Wi-Fi security and Verizon's acquisition of CyberTrust.
>>DOWNLOAD OUR LATEST SECURITY SQUAD PODCAST
ALSO THIS MONTH:
SIMs quiz
Once you've perused Information Security's article this month on new directions in security information management systems, take this quiz and test your knowledge of this important security domain.
>> Take this quiz on security information management (SIMs).


UTM screencast
Expert and author David Strom looked at six UTM appliances in a head-to-head review. Once you've digested that comparison, download this screencast with David, who provides a look at some of the management interfaces for each of the products he reviewed.
>> View our unified threat management screencast.


Keep keys to the kingdom safe
Encryption keys can be cumbersome to secure. Expert W. Curtis Preston provides you with a technical tip that unlocks a few best practices for successful key management.
>> Learn successful encryption key management.


PING: FDIC's Michael L. Jackson
Information Security recently spoke to FDIC associate director Michael L. Jackson about his role in developing and maintaining the FFIEC guidance for risk assessments and strong authentication for financial services institutions.
>> Download our interview with FDIC's Michael L. Jackson.


















HIGHLIGHTS ARCHIVE

May 2007 April 2007 March 2007 February 2007 January 2007 December 2006
November 2006
October 2006 September 2006 August 2006 July 2006 June 2006
May 2006 April 2006 March 2006 February 2006 January 2006 December 2005

This was first published in June 2007

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: