Security Magazine
October Archives: 2012
-
Feature
PDF download: Information Security magazine October 2012
In this issue, find out who won this year's Readers' Choice Awards. Also learn about threat management best practices and how hacktivists are impacting the threat landscape.
2012 Readers' Choice Awards
For the seventh consecutive year, Information Security readers voted to determine the best security products. More than 2,000 voters participated this year, rating products in 14 different categories.
Threat prevention techniques: Best practices for threat management
A successful threat management program requires effective processes, layered technology and user education.
The hacktivist threat to enterprise security
by Robert Westervelt, News Director
With their goal of damaging corporate reputations, hacktivists aren't your average cybercriminals.
Malware trends: The rise of cross-platform malware
Security researchers are finding more malware that attacks multiple operating systems.
-
Column
Big data issues: Big data analytics offers both rewards and risks
Companies are under pressure to take advantage of big data analytics but they should be aware of the risks.
The bolt-on information security trend needs to end
Unless security is viewed as a core function instead of an add-on, we're bound to repeat the mistakes of the past.
Java security problems: Is disabling Java the answer?
In the wake of recent exploits, experts recommend disabling the programming language but that can be tricky in the enterprise.
Security Management Strategies for the CIO