More from SearchSecurity.com -- May 2007

Online content from the May 2007 edition of Information Security magazine, examining best practices for the protection of sensitive information.

Information Security - May 2007


This month, Information Security examines best practices for the protection of sensitive information.

ALSO THIS MONTH:
Emerging malware trends
Awareness of emerging threats is a superb tool for a security manager. It's often your best defense, especially against emerging threats. Review expert and SANS instructor Ed Skoudis' 10 emerging malware trends for 2007.
>> Get Ed Skoudis' emerging malware trends.


Online exclusives

The changing threat of email attacks
In the newest lesson in SearchSecurity.com's Messaging Security School, expert Mike Rothman details the methods and motives behind these next-generation email threats, and explains the specific technological and management changes needed to successfully defeat them. Plus, in an exclusive podcast, Rothman outlines the top five next-generation threats your antivirus system can't catch.
>>GO TO MESSAGING SECURITY SCHOOL

Webcast: Readers' Choice Awards
You may know about the industry's best products, but what market events are affecting the development of tomorrow's infosec wares? In this webcast, Information Security Senior Technology Editor Neil Roiter offers exclusive analysis of the 2007 ISM Readers' Choice Awards, including surprises, disappointments, and emerging product trends.
>>GO TO OUR READERS' CHOICE AWARDS WEBCAST

'Hot Type:' Counter Hack Reloaded
Our latest installment of "Hot Type: Security Books in Audio" is now available. This podcast features a chapter from the Prentice Hall book, "Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses," read aloud by author and infosec threats expert Ed Skoudis.
>>GO TO "HOT TYPE: SECURITY BOOKS IN AUDIO" FEATURING ED SKOUDIS

Browser blues
Some say the state of Web browser security is in peril because browsers often fail to act as a first line of defense. Does that mean there's a browser architecture crisis? Web security expert Michael Cobb says improvements are needed, but the industry's expectations may also need an adjustment.
>>GO TO SCALING BACK WEB BROWSER SECURITY EXPECTATIONS
PING: Paypal's Michael Barrett
Information Security recently spoke to PayPal CISO Michael Barrett about his efforts to secure the most-spoofed brand on the Internet.
>> Download our podcast: Interview with PayPal CISO Michael Barrett


Thwart insider risk
Intellectual property and trade secrets are at risk more than ever. Learn how to secure your company's secret sauce by downloading SearchSecurity.com's Insider Risk Management Guide.
>> Check out SearchSecurity.com's Insider Risk Management Guide


Know your rights (and permissions)
Hiring outside help gives resource-constrained organizations a means of meeting IT needs, but bringing in a contractor can also increase your chances for a serious breach if you're not careful. This Ask the Expert response provides you with some advice on distributing and monitoring rights and permissions.
>> Learn how to distribute and monitor rights and permissions


Get ready for RBAC
Need help addressing authorization in your organization? Once you've read this month's Bits & Bolts feature in Information Security, click through and get more of your role-based access control questions answered by expert Joel Dubin.
>> Learn how role-based access control methods authorize user accounts






























HIGHLIGHTS ARCHIVE

April 2007 March 2007 February 2007 January 2007 December 2006 November 2006
October 2006 September 2006 August 2006 July 2006 June 2006 May 2006
April 2006 March 2006 February 2006 January 2006 December 2005 November 2005
This was first published in May 2007

Dig deeper on Identity Theft and Data Security Breaches

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close