• Countdown: Top 5 consumer authentication technologies on the market today

    In late 2005 the Federal Financial Institutions Examination Council (FFIEC) issued a guidance stating single-factor authentication was no longer adequate for securing online banking transactions. The guidance did not specify what types of technologies would meet the requirement, but many vendors have scrambled to come up with cost-effective and easy product offerings that can be deployed to the masses. This Podcast will countdown the top 5 vendor options available when it comes to consumer Web authentication.

  • Fact or fiction: Don't forget about your intellectual prop

    By creating a data protection plan, security professionals are able to ensure valuable data remains under control and make more effective use of the assets within a company. Check out the expert Podcast featured here and learn more about creating an effective enterprise data protection framework for your organization. Personally-identifiable information (PII) must be protected as mandated by a myriad of regulations. But some organizations overlook the need to protect intellectual property. In this Podcast, we'll explain some of the common misunderstandings about the legal protections for trade secrets and offer you a set of best practices to get started.

  • Fact or fiction: Pros and cons of database encryption

    According to our latest survey of more than 608 enterprise security pros, 80% of enterprises say protecting data is more important in 2007 than last year, and 72% admit they need a better strategy. SearchSecurity.com is responding to this growing need with a multi-lesson Data Protection Security School to help you formulate a comprehensive strategy to secure sensitive info throughout your network. When you are encrypting data within a database you have two basic choices: encrypting the entire database or encrypting specific fields at the data level. This podcast explains the pros and cons of each approach.

  • Fact or fiction: Building and enforcing DLP policies

    Deploying a data loss prevention (DLP) solution is just the first step in the process of controlling the sensitive data flowing through your company's network. But DLP solutions need robust policies and procedures to increase their effectiveness. This expert podcast gives advice for developing comprehensive DLP policies for locking down the most valuable information on your organization's network, as well as strategies and tactics for enforcing those policies with users.

  • Information security podcasts: 2007 archive

    Listen to past editions of our information security podcasts.

  • Podcast: Countdown --Top 5 technologies to help battle the new spam threat

    In this featured podcast, Michael Cobb counts down the top 5 ways for your company to battle new and evolving spam threats, and discusses the pros and cons of current antispam technologies.

  • Kumbaya: How the storage and security teams can work together

    Typically the storage and security teams of a company rarely work together. Unfortunately, as a result most organizations miss out on the benefits that come with storage-security cooperation. This Podcast features a countdown of the top 5 tips for getting your storage and security teams to work together. Listen to this Podcast today and learn why it is important to have both storage and security in sync, and how you can convince your storage counterparts that cooperation is the best approach. Check out this Podcast and hear Perry Carpenter, CISSP, CIPP and Principle of Security Renaissance discuss what it takes for your company's storage and security teams to effectively work together. Learn how to secure your stored data by having your storage and security teams cooperate and listen to this Podcast now.

  • Countdown: Plugging the dam -- Understanding where and how content leaks

    This expert Podcast counts down the top 5 different use cases in which data can leak as a result of outdated data handling policies, and what you can do to make sure these situations don't put your organization in an exposed position.

  • Countdown: Top 5 next-generation messaging attacks that antivirus can't catch

    In this Podcast, expert Mike Rothman counts down the top five next-generation messaging attacks that antivirus can't catch, and tells you how to stop them.

  • Podcast: More or less, a browser security comparison

    Expert Peter Gregory offers a browser security comparison, Firefox vs. IE 7, as well as advice on how to decide which is right for your organization.

  • Smart shopper: What to look for in password management and provisioning

    Password management vendors are getting into the full-blown provisioning game, and traditional vendors are adding Windows logon extensions to facilitate self-service-a hallmark of a password management-only solutions in the past. As these two markets evolve and merge, how does the shift affect security buying decisions? What should buyers look for? This podcast offers some answers to these important questions and more.

  • Top 5 questions to ask when shopping for a compliance product

    The Podcast featured here examines what it takes to implement an effective security and compliance framework.

  • Countdown: Top 5 mobile spyware misconceptions

    This 10-12 minute podcast will count down the top 5 things people may falsely believe or not know about mobile spyware.

  • Podcast: Fact or fiction -- The future of email attacks

    What will the future hold regarding email attacks? In this expert podcast, Tom Bowers will confirm or debunk a number of common beliefs about what's coming next.

  • Podcast: Platform protection -- Security issues for mobile devices

    This 10-minute podcast features a Q&A-style back-and-forth interview with Lisa Phifer, a renowned instructor and conference speaker in the realm of mobile security. The podcast summarizes the security issues facing today's popular mobile device platforms, from Windows Mobile PDAs to BlackBerry smartphones. Find out where you can leverage recently improved operating system security measures and what may be the single most important security measure you can take to secure your organization's devices.

  • Podcast: Top 5 quick tips for safer instant messaging

    Michael Cobb of Cobweb Applications counts down five quick tips that can secure IM in the enterprise. Cobb discusses account naming rules, acceptable use policy, instant messaging encryption and much more.

  • Information security podcasts: 2006 archive

    Listen to past editions of our information security podcasts.

  • Information security podcasts: 2005 archive

    Listen to past editions of SearchSecurity.com's Security Wire Weekly podcast, offering news, interviews and current events in the information Security market.