This month, Information Security examines best practices for the protection of sensitive information.
ALSO THIS MONTH:
Emerging malware trends
Awareness of emerging threats is a superb tool for a security manager. It's often your best defense, especially against emerging threats. Review expert and SANS instructor Ed Skoudis' 10 emerging malware trends for 2007.
>> Get Ed Skoudis' emerging malware trends.
Information Security recently spoke to PayPal CISO Michael Barrett about his efforts to secure the most-spoofed brand on the Internet.
>> Download our podcast: Interview with PayPal CISO Michael Barrett
Thwart insider risk
Intellectual property and trade secrets are at risk more than ever. Learn how to secure your company's secret sauce by downloading SearchSecurity.com's Insider Risk Management Guide.
>> Check out SearchSecurity.com's Insider Risk Management Guide
Know your rights (and permissions)
Hiring outside help gives resource-constrained organizations a means of meeting IT needs, but bringing in a contractor can also increase your chances for a serious breach if you're not careful. This Ask the Expert response provides you with some advice on distributing and monitoring rights and permissions.
>> Learn how to distribute and monitor rights and permissions
Get ready for RBAC
Need help addressing authorization in your organization? Once you've read this month's Bits & Bolts feature in Information Security, click through and get more of your role-based access control questions answered by expert Joel Dubin.
>> Learn how role-based access control methods authorize user accounts
|April 2007||March 2007||February 2007||January 2007||December 2006||November 2006|
|October 2006||September 2006||August 2006||July 2006||June 2006||May 2006|
|April 2006||March 2006||February 2006||January 2006||December 2005||November 2005|
This was first published in May 2007