More from SearchSecurity.com -- November 2006

Highlights from November edition of Information Security magazine

This Content Component encountered an error


Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the magazine, explore this month's topics further on SearchSecurity.com.

 THIS MONTH ON SEARCHSECURITY.COM

 Securing mobile devices 
Today it is common for executives to use their handheld device as a critical business tool containing sensitive documents. How do you lock down these mobile devices and protect traffic in the air? Our new Messaging Security School addresses this and other problems with advice from leading experts including Tom Bowers, Michael Cobb, Lisa Phifer and others. 

Zeroing in on the midmarket 
Is the current-crop of enterprise-grade security technology a little too robust and expensive for your needs? SearchSecurity.com takes a closer look at intrusion defense and ID and access management products designed specifically for the midmarket. Read the feature articles and listen to our expert podcasts. 

We Bring ISD to You 
Were you unable to make our annual Information Security Decisions conference held in Chicago last month? Go to SearchSecurity.com to get many of the presentations from experts like Joel Snyder, Richard Mackey, Tom Bowers, Diana Kelley, Michael Cobb and many others.


Thwart hacking techniques
This month's issue of Information Security examines steganography, which is a method of hiding messages within a host file. If you're an enterprise security manager, it would be wise to familiarize yourself with the techniques hackers and insiders are using to steal data in plain view. This learning guide on the latest hacker techniques gives you a head start on malicious users.
>> Review our Thwarting Hacker Techniques Learning Guide.

Conduct a risk analysis
A well-crafted business impact analysis can be the difference between a minor outage and major trouble. This installment of SearchSecurity.com's Risk Management Guide helps you identify asset value, vulnerabilities and threats to those assets, quantify the business impact posed by threats, and set goals for your risk analysis.
>> Read How to conduct a risk analysis

Deal with switches and segments
You know your copper-wire networks can be hacked, but fiber is crack-proof, right? Think again. There are tools readily available on the Internet that can expose network to outsiders. If you want to read more about fiber taps, check out this technical tip.
>> Read How to deal with switches and segments

PING with Aviel Rubin
In this exclusive interview with Information Security magazine, Aviel Rubin, author of Brave New Ballot, examines security problems in e-voting machines, and explains why isn't just a cause for concern, it's a matter of national security.
>> Read the interview with Aviel Rubin





HIGHLIGHTS ARCHIVES
October 2006 September 2006 August 2006 July 2006 June 2006 May 2006
April 2006 March 2006 February 2006 January 2006 December 2005 November 2005
October 2005 September 2005 August 2005 July 2005 June 2005 May 2005
This was first published in November 2006

Dig deeper on Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close