This month, Information Security magazine reviews six device control tools that manage the access and privileges meted out to removable storage devices like USB drives, MP3 players and other media. Once you've digested the verdict on those products, SearchSecurity.com expert Shon Harris tackles the quandary facing security managers of balancing the demand for these convenience storage devices and implementing guidelines for their safe use. Harris provides three steps to follow that address regulatory concerns, classification of data and access controls.
Leverage compliance, measure risk
It seems like the concept of balancing security with user/customer demand is central to a security manager's job. But what about balancing security and regulatory compliance demands? Just because your organization complies with SOX, does that mean it's more secure? As a complement to story in the March issue (Balancing Act), writer George Hulme talks to security managers about how they leverage compliance to help with their risk assessments and measurements.
>> Read Leverage compliance, measure risk.
Enterprise UTM: A Different Animal
Unified threat management has its own look in the enterprise--and it doesn't always resemble the all-in-one platform popular with small- and medium-sized businesses. Expert Lisa Phifer hosts a Webcast this month that will help you sort the two and make the right call based on the needs of your organization.
>> Check back to register for this upcoming UTM webcast
HIPAA Learning Essentials
A Maine health care provider rid itself of its spyware-ridden PCs for a thin client environment. Not only did the move centralize security management, but it greatly helped the organization with its HIPAA compliance efforts. SearchSecurity.com can help even further with its comprehensive HIPAA Learning Guide. The guide is a collection of new articles, expert analysis and advice, white papers and case studies to keep you on track in what is a perpetual challenge to maintain compliance with an important regulatory privacy and security mandate.
>> Review the HIPAA Learning Guide
PING with Mark Odiorne
In this exclusive interview with Information Security magazine Mark Odiorne, CISO at Scottish Re, provides insight on attacking your own network, prioritizing security for senior management and the joys of compliance.
>> Read the interview with Mark Odiorne
|February 2007||January 2007||December 2006||November 2006||October 2006||September 2006|
|August 2006||July 2006||June 2006||May 2006||April 2006||March 2006|
|February 2006||January 2006||December 2005||November 2005||October 2005||September 2005|
This was first published in March 2007