Information Security maga

More from SearchSecurity.com -- March 2007



This month, Information Security magazine reviews six device control tools that manage the access and privileges meted out to removable storage devices like USB drives, MP3 players and other media. Once you've digested the verdict on those products, SearchSecurity.com expert Shon Harris tackles the quandary facing security managers of balancing the demand for these convenience storage devices and implementing guidelines for their safe use. Harris provides three steps to follow that address regulatory concerns, classification of data and access controls.

THIS MONTH ON SEARCHSECURITY.COM

Compliance School
Compliance success isn't about a one-time effort. It takes ongoing refinement of processes involving technology adoption and use, corporate governance and IT policies and procedures. In the newest lesson  in SearchSecurity.com's Compliance School, compliance expert Richard Mackey explores what it takes to transform a run-of-the-mill compliance program into one that's the envy of your peers. Learn about assessing applications, project management and workflow, control frameworks and process mapping, plus get an insider's look at the market for compliance products so that you're prepared when it's time to allocate the compliance budget.
National Cybersecurity Podcast
Greg Garcia is in his fifth month as the nation's cybersecurity chief, and he has plenty to worry about. In this special Newsmaker podcast, Garcia talks about the need for greater public-private partnerships, and explains why network convergence will present a "breeding ground for security problems."
Mitigate emerging mobile threats Your organization's mobile devices are at risk, whether you know it or not. Give your mobile security program a hand by checking out Sandra Kay Miller's new lesson on defending mobile devices from viruses, spyware and malware. Learn the top mobile threat vectors and the best methods to mitigate emerging mobile threats.



Leverage compliance, measure risk
It seems like the concept of balancing security with user/customer demand is central to a security manager's job. But what about balancing security and regulatory compliance demands? Just because your organization complies with SOX, does that mean it's more secure? As a complement to story in the March issue (Balancing Act), writer George Hulme talks to security managers about how they leverage compliance to help with their risk assessments and measurements.
>> Read Leverage compliance, measure risk.

Enterprise UTM: A Different Animal
Unified threat management has its own look in the enterprise--and it doesn't always resemble the all-in-one platform popular with small- and medium-sized businesses. Expert Lisa Phifer hosts a Webcast this month that will help you sort the two and make the right call based on the needs of your organization.
>> Check back to register for this upcoming UTM webcast

HIPAA Learning Essentials
A Maine health care provider rid itself of its spyware-ridden PCs for a thin client environment. Not only did the move centralize security management, but it greatly helped the organization with its HIPAA compliance efforts. SearchSecurity.com can help even further with its comprehensive HIPAA Learning Guide. The guide is a collection of new articles, expert analysis and advice, white papers and case studies to keep you on track in what is a perpetual challenge to maintain compliance with an important regulatory privacy and security mandate.
>> Review the HIPAA Learning Guide

PING with Mark Odiorne
In this exclusive interview with Information Security magazine Mark Odiorne, CISO at Scottish Re, provides insight on attacking your own network, prioritizing security for senior management and the joys of compliance.
>> Read the interview with Mark Odiorne








HIGHLIGHTS ARCHIVES
February 2007 January 2007 December 2006 November 2006 October 2006 September 2006
August 2006 July 2006 June 2006 May 2006 April 2006 March 2006
February 2006 January 2006 December 2005 November 2005 October 2005 September 2005

This was first published in March 2007

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: