|
|
This month, Information Security magazine examines the role of security integrators and consultants, and helps you manage relationships with outside help.
In this exclusive for SearchSecurity.com, ISM Features Editor Marcia Savage asks experts about the value your organization should place on an integrator's credentials and how that should influence your selection process.
|
||||
SIMs quiz
Once you've perused Information Security's article this month on new directions in security information management systems, take this quiz and test your knowledge of this important security domain.
>> Take this quiz on security information management (SIMs).
UTM screencast
Expert and author David Strom looked at six UTM appliances in a head-to-head review. Once you've digested that comparison, download this screencast with David, who provides a look at some of the management interfaces for each of the products he reviewed.
>> View our unified threat management screencast.
Keep keys to the kingdom safe
Encryption keys can be cumbersome to secure. Expert W. Curtis Preston provides you with a technical tip that unlocks a few best practices for successful key management.
>> Learn successful encryption key management.
PING: FDIC's Michael L. Jackson
Information Security recently spoke to FDIC associate director Michael L. Jackson about his role in developing and maintaining the FFIEC guidance for risk assessments and strong authentication for financial services institutions.
>> Download our interview with FDIC's Michael L. Jackson.
| ||||||
This was first published in June 2007
Security Management Strategies for the CIO



















Join the conversationComment
Share
Comments
Results
Contribute to the conversation