|
|
Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the magazine, explore this month's topics further on SearchSecurity.com.
|
||||
Thwart hacking techniques
This month's issue of Information Security examines steganography, which is a method of hiding messages within a host file. If you're an enterprise security manager, it would be wise to familiarize yourself with the techniques hackers and insiders are using to steal data in plain view. This learning guide on the latest hacker techniques gives you a head start on malicious users.
>> Review our Thwarting Hacker Techniques Learning Guide.
Conduct a risk analysis
A well-crafted business impact analysis can be the difference between a minor outage and major trouble. This installment of SearchSecurity.com's Risk Management Guide helps you identify asset value, vulnerabilities and threats to those assets, quantify the business impact posed by threats, and set goals for your risk analysis.
>> Read How to conduct a risk analysis
Deal with switches and segments
You know your copper-wire networks can be hacked, but fiber is crack-proof, right? Think again. There are tools readily available on the Internet that can expose network to outsiders. If you want to read more about fiber taps, check out this technical tip.
>> Read
How to deal with switches and segments
PING with Aviel Rubin
In this exclusive interview with Information Security magazine, Aviel Rubin, author of Brave New Ballot, examines security problems in e-voting machines, and explains why isn't just a cause for concern, it's a matter of national security.
>> Read the interview with Aviel Rubin
| HIGHLIGHTS ARCHIVES |
Security Management Strategies for the CIO


















Join the conversationComment
Share
Comments
Results
Contribute to the conversation