Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the magazine, explore this month's topics further on SearchSecurity.com.
Thwart hacking techniques
This month's issue of Information Security examines steganography, which is a method of hiding messages within a host file. If you're an enterprise security manager, it would be wise to familiarize yourself with the techniques hackers and insiders are using to steal data in plain view. This learning guide on the latest hacker techniques gives you a head start on malicious users.
>> Review our Thwarting Hacker Techniques Learning Guide.
Conduct a risk analysis
A well-crafted business impact analysis can be the difference between a minor outage and major trouble. This installment of SearchSecurity.com's Risk Management Guide helps you identify asset value, vulnerabilities and threats to those assets, quantify the business impact posed by threats, and set goals for your risk analysis.
>> Read How to conduct a risk analysis
Deal with switches and segments
You know your copper-wire networks can be hacked, but fiber is crack-proof, right? Think again. There are tools readily available on the Internet that can expose network to outsiders. If you want to read more about fiber taps, check out this technical tip.
>> Read How to deal with switches and segments
PING with Aviel Rubin
In this exclusive interview with Information Security magazine, Aviel Rubin, author of Brave New Ballot, examines security problems in e-voting machines, and explains why isn't just a cause for concern, it's a matter of national security.
>> Read the interview with Aviel Rubin
|October 2006||September 2006||August 2006||July 2006||June 2006||May 2006|
|April 2006||March 2006||February 2006||January 2006||December 2005||November 2005|
|October 2005||September 2005||August 2005||July 2005||June 2005||May 2005|
Dig Deeper on Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions