More from SearchSecurity.com -- October 2006

Highlights from the October 2006 issue of Information Security magazine.

This Content Component encountered an error



Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the magazine, explore this month's topics further on SearchSecurity.com.

 THIS MONTH ON SEARCHSECURITY.COM

Securing mobile devices 
Today it is common for executives to use their handheld device as a critical business tool containing sensitive documents. How do you lock down these mobile devices and protect traffic in the air? Our Messaging Security School addresses this problem and others. This webcast delivered by expert Lisa Phifer debuts Oct. 31, 2006. 

Zeroing in on the midmarket 
Is the current crop of enterprise-grade security technology a little too expensive for your needs? This month SearchSecurity.com takes a closer look at intrusion defense and ID and access management products designed specifically for the midmarket. Read the feature articles and listen to our expert podcasts. 

How to use Nmap in the enterprise
As part of our ongoing Nmap series, data security expert Michael Cobb explains how to use the tool to verify that your firewall rules are performing as intended. Get all 10 tips on Oct. 17, 2006 as part of our Nmap Technical Guide.



How to get the most out of database monitoring tools
This month's issue of Information Security examines the myriad ways sensitive corporate and customer data escapes a database. CISOs and industry experts point out that it's not always an exotic digital break-in that's at the heart of a data leak. Often, it's an issue with data governance. Data is everywhere, and security managers must keep pace, or be left behind. On Oct. 12, Information Security contributing editor James C. Foster will host a live webcast, How to get the most out of database monitoring tools.
>> Register for How to get the most out of database monitoring tools.

Alphabet soup: Understanding standards for risk management and compliance
Also this month, you read about enterprise rights management and the importance of securing documents and maintaining the access privileges you define. This technical article helps you get started with a risk assessment of data and documents.
>> Read Alphabet soup: Understanding standards for risk management and compliance


Recognize leading security professionals
Think you have a star security practitioner in your enterprise? Information Security anually recognizes annually leading security professionals in seven veritical. You read about this year's winners in the current issue. Now, learn more about the 2005 winners.
>> Learn more about the 2005 Security Seven award winners

PING with Suzanne Hall
In this exclusive interview with Information Security magazine, Suzanne Hall, AARP director of IT operations and security, examines how security professionals can enable telecommuters and mobile workers while keeping their data secure.
>> Read the interview with Suzanne Hall

HIGHLIGHTS ARCHIVES
September 2006 August 2006 July 2006 June 2006 May 2006 April 2006
March 2006 February 2006 January 2006 December 2005 November 2005 October 2005
September 2005 August 2005 July 2005 June 2005 May 2005 April 2005
This was first published in October 2006

Dig deeper on Security Industry Market Trends, Predictions and Forecasts

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close