Email Alerts
-
Seven Outstanding Security Pros in 2012
Find out who won this year’s Security 7 Award, which honors outstanding security professionals in seven vertical markets. Also in this issue, we examine the pros and cons of the Metasploit penetration testing framework, and ways to overcome cloud com... E-Zine
-
Security Readers' Choice Awards 2012: Your picks for the best security products
In this issue, find out who won this year's Readers' Choice Awards. More than 2,100 readers participated this year, rating the best security products in 14 categories. The issue also features an article by Diana Kelley of SecurityCurve, who examines ... E-Zine
-
Spotlight on top security trends of 2011 and Security 7 award winners
2011 has been an overwhelming year for security; complete with security breaches, subsequent attacks and an abundance of negative attention. This month’s edition of Information Security Magazine, brought to you by SearchSecurity.com, is looking past ... E-Zine
-
The top 2011 security products: Information Security Readers' Choice Awards
This month, we reveal the best security products in 14 different categories. Find out the best products for anti-malware, authentication, risk management, vulnerability management and more. E-Zine
-
Security 7 Award winners and the latest on effective security awareness
We announce the winners of the sixth annual Security 7 Awards in this special issue. The award winners offer advice for tackling enterprise security challenges. Plus, learn how to set up an effective information security awareness program and find ou... E-Zine
-
2010 Security Readers' Choice Awards
In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which... E-Zine
-
Winners of Information Security magazine's Security 7 Award
The big news in this month's issue is the announcement of the winners of the fifth annual Security 7 Award. Other featured articles present tips for preventing future incidents and also explain how SOX compliance is hitting smaller public companies h... E-Zine
-
2009 Security Readers' Choice Awards
This issue of Information Security Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 diff... E-Zine
-
Everything you need to know about today's information security trends
This month, Information Security magazine covers everything you need to know in the security climate of 2008. From PCI compliance to server hardening to desktop lockdown, as well as business-security integration and data lifecycle security, this issu... E-Zine
-
Security Readers' Choice Awards 2008
Do you see a champion product on your roster? Find out in this issue of Information Security, which features the top products you chose in 17 categories. E-Zine
- See more Premium Content on Security Industry Market Trends, Predictions and Forecasts
-
IT content and vendor engagement evaluation survey
When IT professionals, such as you, have an IT project at their organization, there is a need to research multiple pieces of content from a variety of sources including vendors, third-parties and experts. This survey will allow TechTarget to identify... Survey
-
Information Security magazine editorial calendar
Check out our Information Security magazine editorial calendar to learn what's planned for future issues. Editorial Calendar
-
2011 Security 7 Award winners
Information Security magazine announces the winners of the seventh annual Security 7 Awards. Guide
-
Best Authentication Products 2011
Readers vote on the best digital identity verification products, services, and management systems, including PKI, hardware and software tokens, smart cards. Guide
-
Best Messaging Security Products 2011
Readers vote on the best antispam, antiphishing, email antivirus and antimalware filtering, software and appliance products, as well as hosted "in-the-cloud" email security services. Guide
-
Best Identity and Access Management Products 2011
Readers vote on the best identity and access management products, including user identity access privilege and authorization management, single sign-on, user identity provisioning. Guide
-
Best Intrusion Detection/Prevention Products 2011
Readers vote on the best intrusion prevention/detection products, including network-based intrusion detection and prevention appliances, using signature-, behavior-, anomaly- and rate-based detection. Guide
-
Best Mobile Data Security Products 2011
Readers vote on the best mobile data security products, including hardware- and software-based file and full disk laptop encryption and removable storage device protection. Guide
-
Best Network Access Control Products 2011
Readers vote for the best NAC products, including appliance, software and infrastructure user and device network access policy creation, compliance, enforcement and remediation. Guide
-
Best Antimalware Products 2011
Readers vote on the best business-grade desktop and server antivirus and antispyware products. Guide
- See more Essential Knowledge on Security Industry Market Trends, Predictions and Forecasts
-
Cisco spends cool $2.7 billion in Sourcefire acquisition
In biggest security acquisition since 2011, Cisco has announced it will buy IDS maker Sourcefire for $2.7 billion. News | 24 Jul 2013
-
Damballa: Security vendor partnerships of growing importance
Damballa executives say partnerships among security point product vendors are increasingly important, and will ultimately benefit enterprises. News | 09 Jul 2013
-
Ponemon data breach study finds costs up, notification major driver
The latest Ponemon study on data breaches found that the cost per lost record in an average breach incident increased modestly, from $130 to $136. News | 05 Jun 2013
-
RSA 2013: More from Coviello on big data analytics in the security industry
RSA's Art Coviello explains why the shortcomings of current mainstream security products are part of what's driving enterprise interest in big data. News | 28 Feb 2013
-
RSA 2013: Charney optimistic about the future of information security
In his RSA Conference 2013 keynote, Microsoft's Scott Charney struck an optimistic note when talking about the future of information security. News | 27 Feb 2013
-
Coviello pitches 'transformational' information security strategy
In a talk critical of cyberattack finger-pointing, Art Coviello stressed the need for infosec strategy to emphasize big data, interconnectivity. News | 26 Feb 2013
-
Many in industry at odds over pending cybersecurity executive order
Some security industry veterans fear regulatory overreach, others believe an executive order won't go far enough. News | 03 Dec 2012
-
Government, industry leaders share cybersecurity funding priorities
Research projects focusing on embedded device security, system resiliency and security metrics are gaining the most attention, experts say. News | 15 Nov 2012
-
Eugene Kaspersky: Enterprises must make hacking difficult, costly
Companies must get better at making hacking corporate networks complicated and costly for cybercriminals, explains Kaspersky Lab CEO Eugene Kaspersky. News | 14 Nov 2012
-
Successful cyberattacks driving up cost of cybercrime, study finds
A study by the Ponemon Institute found that successful cyberattacks rose from 50 attacks on average per week in 2010 to 102 on average per week. News | 08 Oct 2012
- See more News on Security Industry Market Trends, Predictions and Forecasts
-
Opinion: DBIR, other computer security statistics paint tricky picture
Verizon's annual breach report highlights a spate of new security research reports. However, overall conclusions from these are hard to come by. News
-
Opinion: The APT1 aftermath and information sharing
Marcus Ranum says the Mandiant APT1 report must serve as a model for better information sharing within the information security industry. Opinion
-
2013 Security Priority Survey, security risks when buying IT hardware from China
Information Security Magazine reveals the results of its 2013 Security Priority Survey and examines the security risks associated with purchasing IT hardware from China. Elsewhere in the issue, infosec pros share their strategies for BYOD security. Editor's Letter
-
Emerging vulnerability markets, mobile biometrics prompt security concerns
Information Security Magazine examines key security concerns in the field of critical infrastructure protection and explores options for mobile biometric authentication because you’ll need to think about a new security strategy as mobile devices outn... Column
-
Security 7 Award 2012: Seven Outstanding Information Security Pros
Security 7 Award 2012 honors seven outstanding information security pros. Find out who won this year’s Security 7 Award. Column
-
In enterprises, proactive information security finally taking hold
Editorial director Andrew Briney says frustration with failure is driving proactive information security spending on new technologies. Opinion
-
Editor's desk: The future of 'Information Security' magazine
Lawrence Walsh explains why the combo of "Information Security" and SearchSecurity.com is the industry's No. 1 trusted infosec resource. Column
-
Opinion: 2003 Gartner Hype Cycle for infosec is wrong on IDS
Et tu, Gartner? The research firm's pronouncement that IDS is dead is just the latest Hype Cycle gone awry. Opinion
-
How to manage the deluge of information security threat reports
Many vendors and analysts publish information security threat reports. See Joseph Granneman's strategy to find and use the information that matters. Tip
-
Identity Ecosystem should make life a little easier for IT shops
While implementation of the Identity Ecosystem is a long way off, the benefits for projects such as electronic health records could be significant. Tip
-
Identity and access management concepts and predictions to watch in 2011
Forrester's Andras Cser discusses the emerging identity and access management concepts and market predictions enterprises should be prepared for in 2011. Tip
-
Security compliance predictions for 2010: New regulations, new technology
What will 2010 hold for security compliance? Security management expert David Mortman discusses HITECH, changes to PCI and cloud computing compliance strategies for the new year. Tip
-
Information security forecast: Security management in 2009
What will the year ahead hold for information security? Learn about the likely trends -- from dealing with questions of enterprise virtualization and SaaS security, to Web application security, to compliance issues. Tip
-
Identity and access management 2009: Staff cuts, insider threats
Identity and access management in 2009 will be drastically different from 2008, most notably because staff reductions may result in a new crop of malicious attackers. In this tip, David Griffeth explains how to deal with growing outsider and insider ... Tip
-
User provisioning software: Emerging features reveal market's future
As a fundamental feature of IAM suites, user provisioning can streamline access to multiple systems on a network. But how does user provisioning work and what features is it likely to add in the future? IAM expert Joel Dubin analyzes Gartner's Magic ... Tip
-
How to look past information security vendor rhetoric
Security professionals are bombarded with messages from vendors (and their marketing messages) heralding sure-fire cure-alls for compliance and information security woes. So what's the best way to differentiate between a useful product and a useless ... Tip
-
Trends in enterprise identity and access management
The market for identity and access management (IAM) products is growing rapidly to meet varied business and compliance demands. What trends -- good and bad -- are on the horizon? IAM expert Joel Dubin offers a guide to the products that are moving th... Tip
-
2006 Products of the Year: Emerging Technologies
Information Security magazine and SearchSecurity.com readers chose the top three emerging technologies for 2006. Tip
- See more Tips on Security Industry Market Trends, Predictions and Forecasts
-
How will the cloud affect future network security skills requirements?
Will the ongoing adoption of cloud technology affect the skills that network security engineers need in the future? Matt Pascucci discusses. Answer
-
Purchasing a next-gen firewall: Buying from vendors in legal battles
Mike Chapple discusses whether enterprises should purchase next-gen firewall products from allegedly patent-infringing vendors. Answer
-
Latest computer virus count: Does more malware mean greater threat?
With the number of viruses reaching an all-time high, how should enterprises react to sustain information security? Threats expert Nick Lewis weighs in. Ask the Expert
-
Comparing cheap security products and appliances to costly appliances
Security appliances range widely in cost and capability, so what's the best way to decide the right appliance for your enterprise? In this security management expert response, learn how to work with vendors to get the security tools you need. Ask the Expert
-
What does the future of the endpoint encryption market look like?
Full-disk encryption may be a must-have, but where is the endpoint encryption market headed? Security management expert Mike Rothman looks at recent mergers to predict what the future may hold. Ask the Expert
-
How can organizations secure implanted microchips and RFID tags?
RFID tages and implanted microchips provide excellent tracking technolgies, but what security risks do they involve? Security management expert Mike Rothman weighs in. Ask the Expert
-
January 2004: Ask the Expert Readers' Choice
Ask the Expert
-
An Oracle professional looking to move over to infosec
Ask the Expert
-
Topics for company Information Security Forum
Ask the Expert
-
Products for screen redisplay
Ask the Expert
- See more Expert Advice on Security Industry Market Trends, Predictions and Forecasts
-
mobile security (wireless security)
Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless ... Definition
-
backscatter body scanning
Backscatter body scanning is an X-ray-based technology that yields a high-resolution image of a person's body beneath their clothing and reveals concealed objects... (Continued) Definition
-
marketecture (or marchitecture)
A marketecture (or marchitecture) is a high-level representation of software or hardware architecture designed with marketing requirements as a primary consideration. (Continued...) Definition
-
NCSA
NCSA at the University of Illinois in Urbana, Illinois is the home of the first Web browser that had a graphical user interface. Definition
-
Palladium
Palladium is a plan from Intel, AMD, and Microsoft to build security into personal computers and servers at the microprocessor level. Definition
-
Cyberthreat landscape plagued by automated attacks, Gartner says
Gartner VP Richard Hunter reviews the enterprise cyberthreat landscape and explains why automated attacks will only make a bad situation worse. Podcast
-
What to cut from an enterprise information security budget
Information security budgets remain largely flat, but an even bigger concern says In-Q-Tel's Peter Kuper, is what is included in those budgets. Video
-
Mobile security survey 2012 audio slideshow
SearchSecurity.com presents the key findings of its 2012 mobile security survey with audio analysis by editors Eric B. Parizo and Robert Westervelt. Audio Slideshow
-
Peter Kuper on IT and the economy; IT security spending outlook
In this special keynote, In-Q-Tel's Peter Kuper analyzes the state of IT and the economy in 2012, and the resulting IT security spending outlook. Video
-
NSA’s Sager on trends of 2011 security breaches, advanced persistent threat hype
The NSA’s Tony Sager discusses macro trends of 2011 security breaches, why advanced persistent threat hype isn’t justified, and infosec lessons learned from his wife and kids. Video
-
Black Hat 2011: SIM rule maker on attacks and defenses
LogRhythm Labs explains their new rules for the vendor’s SIM appliances. Video
-
Black Hat 2011: Malware threats, attack vectors and data sharing
Rodrigo Branco talks about vulnerabilities, malware sophistication and whether the move to cloud-based services will change the way cybercriminals work. Video
-
Marcus Ranum on cyberwar, critical infrastructure protection
Network security expert Marcus Ranum explains why he believes cyberwarfare is only a tool for powerful nation states and discusses how Stuxnet supports his premise. Video
-
Podcast: Verizon explains 2011 DBIR
Bryan Sartin of Verizon explains why attackers are targeting smaller businesses and talks about the rising value of account credentials and intellectual property on the black market. Podcast
-
Video: Inside the Verizon Data Breach Investigations Report 2011
Verizon's Wade Baker previews the 2011 Verizon Breach Investigations Report and shares surprising insight from the 2010 report on tactics that do and don't help prevent breaches. Video
- See more Multimedia on Security Industry Market Trends, Predictions and Forecasts
-
Cisco spends cool $2.7 billion in Sourcefire acquisition
In biggest security acquisition since 2011, Cisco has announced it will buy IDS maker Sourcefire for $2.7 billion. News
-
Cyberthreat landscape plagued by automated attacks, Gartner says
Gartner VP Richard Hunter reviews the enterprise cyberthreat landscape and explains why automated attacks will only make a bad situation worse. Podcast
-
Damballa: Security vendor partnerships of growing importance
Damballa executives say partnerships among security point product vendors are increasingly important, and will ultimately benefit enterprises. News
-
IT content and vendor engagement evaluation survey
When IT professionals, such as you, have an IT project at their organization, there is a need to research multiple pieces of content from a variety of sources including vendors, third-parties and experts. This survey will allow TechTarget to identify... Survey
-
How to manage the deluge of information security threat reports
Many vendors and analysts publish information security threat reports. See Joseph Granneman's strategy to find and use the information that matters. Tip
-
Ponemon data breach study finds costs up, notification major driver
The latest Ponemon study on data breaches found that the cost per lost record in an average breach incident increased modestly, from $130 to $136. News
-
How will the cloud affect future network security skills requirements?
Will the ongoing adoption of cloud technology affect the skills that network security engineers need in the future? Matt Pascucci discusses. Answer
-
Opinion: DBIR, other computer security statistics paint tricky picture
Verizon's annual breach report highlights a spate of new security research reports. However, overall conclusions from these are hard to come by. News
-
Opinion: The APT1 aftermath and information sharing
Marcus Ranum says the Mandiant APT1 report must serve as a model for better information sharing within the information security industry. Opinion
-
RSA 2013: More from Coviello on big data analytics in the security industry
RSA's Art Coviello explains why the shortcomings of current mainstream security products are part of what's driving enterprise interest in big data. News
- See more All on Security Industry Market Trends, Predictions and Forecasts
About Security Industry Market Trends, Predictions and Forecasts
Information security industry trends and forecasts from research firms and analysts, and predictions on hot technologies and market analysis futures from industry experts.
Security Management Strategies for the CIO