This month, Information Security magazine examines the role of security integrators and consultants, and helps you manage relationships with outside help.
In this exclusive for SearchSecurity.com, ISM Features Editor Marcia Savage asks experts about the value your organization should place on an integrator's credentials and how that should influence your selection process.
Once you've perused Information Security's article this month on new directions in security information management systems, take this quiz and test your knowledge of this important security domain.
>> Take this quiz on security information management (SIMs).
Expert and author David Strom looked at six UTM appliances in a head-to-head review. Once you've digested that comparison, download this screencast with David, who provides a look at some of the management interfaces for each of the products he reviewed.
>> View our unified threat management screencast.
Keep keys to the kingdom safe
Encryption keys can be cumbersome to secure. Expert W. Curtis Preston provides you with a technical tip that unlocks a few best practices for successful key management.
>> Learn successful encryption key management.
PING: FDIC's Michael L. Jackson
Information Security recently spoke to FDIC associate director Michael L. Jackson about his role in developing and maintaining the FFIEC guidance for risk assessments and strong authentication for financial services institutions.
>> Download our interview with FDIC's Michael L. Jackson.
|May 2007||April 2007||March 2007||February 2007||January 2007||December 2006|
|November 2006||October 2006||September 2006||August 2006||July 2006||June 2006|
|May 2006||April 2006||March 2006||February 2006||January 2006||December 2005|
This was first published in June 2007