This month, Information Security examines best practices for the protection of sensitive information.
ALSO THIS MONTH:
Emerging malware trends
Awareness of emerging threats is a superb tool for a security manager. It's often your best defense, especially against emerging threats. Review expert and SANS instructor Ed Skoudis' 10 emerging malware trends for 2007.
>> Get Ed Skoudis' emerging malware trends.
 |
Online exclusives |
The changing threat of email attacks In the newest lesson in SearchSecurity.com's Messaging Security School, expert Mike Rothman details the methods and motives behind these next-generation email threats, and explains the specific technological and management changes needed to successfully defeat them. Plus, in an exclusive podcast, Rothman outlines the top five next-generation threats your antivirus system can't catch. >>GO TO MESSAGING SECURITY SCHOOL
Webcast: Readers' Choice Awards You may know about the industry's best products, but what market events are affecting the development of tomorrow's infosec wares? In this webcast, Information Security Senior Technology Editor Neil Roiter offers exclusive analysis of the 2007 ISM Readers' Choice Awards, including surprises, disappointments, and emerging product trends. >>GO TO OUR READERS' CHOICE AWARDS WEBCAST
'Hot Type:' Counter Hack Reloaded Our latest installment of "Hot Type: Security Books in Audio" is now available. This podcast features a chapter from the Prentice Hall book, "Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses," read aloud by author and infosec threats expert Ed Skoudis. >>GO TO "HOT TYPE: SECURITY BOOKS IN AUDIO" FEATURING ED SKOUDIS
Browser blues Some say the state of Web browser security is in peril because browsers often fail to act as a first line of defense. Does that mean there's a browser architecture crisis? Web security expert Michael Cobb says improvements are needed, but the industry's expectations may also need an adjustment. >>GO TO SCALING BACK WEB BROWSER SECURITY EXPECTATIONS |
|
|
 |
 |
PING: Paypal's Michael Barrett
Information Security recently spoke to PayPal CISO Michael Barrett about his efforts to secure the most-spoofed brand on the Internet.
>> Download our podcast: Interview with PayPal CISO Michael Barrett
Thwart insider risk
Intellectual property and trade secrets are at risk more than ever. Learn how to secure your company's secret sauce by downloading SearchSecurity.com's Insider Risk Management Guide.
>> Check out SearchSecurity.com's Insider Risk Management Guide
Know your rights (and permissions)
Hiring outside help gives resource-constrained organizations a means of meeting IT needs, but bringing in a contractor can also increase your chances for a serious breach if you're not careful. This Ask the Expert response provides you with some advice on distributing and monitoring rights and permissions.
>> Learn how to distribute and monitor rights and permissions
Get ready for RBAC
Need help addressing authorization in your organization? Once you've read this month's Bits & Bolts feature in
Information Security, click through and get more of your role-based access control questions answered by expert Joel Dubin.
>> Learn how role-based access control methods authorize user accounts