Analysis: Facing identity crisis, Symantec needs strategic focus

Security Industry Market Trends, Predictions and Forecasts

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Everything you need to know about today's information security trends

    This month, Information Security magazine covers everything you need to know in the security climate of 2008. From PCI compliance to server hardening to desktop lockdown, as well as business-security integration and data lifecycle security, this issu... 

  • Security Readers' Choice Awards 2008

    Do you see a champion product on your roster? Find out in this issue of Information Security, which features the top products you chose in 17 categories. 

  • Security Products Readers' Choice Awards 2007

    In this month's issue of Information Security magazine, find out which security products were your picks as best in class for 2007 in categories including vulnerability management, intrusion detection, authentication, antimalware, risk management, un... 

  • Best-of-breed: Security Products of the Year: 2006

    In this issue, we crown the best-of-breed security products in 13 categories. Learn which ones made the cut. Also, get information on the shrinking security market, and tips for protecting stored data. 

  • How security pros can benefit from information sharing

    Information sharing has not always been security pros' forte, but Ernie Hayden, CISO for the Port of Seattle, and Kirk Bailey, CISO for the City of Seattle, are showing that doesn't have to be the case. Also in this issue, get tips on vulnerability m... 

  • Olympic trials: Securing the summer games

    Physical security will be highly visible when the Olympic Games open Aug. 13. Behind the scenes, a small army of IT professionals will be working to guard against digital intrusions that could enable or amplify a real-world attack. Other stories cove... 

  • Depth charge: Survey shows big spending on defense in depth

    How do you prepare for a doomsday worm when you don't know what it will look like or when (or even if) it will come? How do you balance efforts to head off the "big one" with the need to address hundreds of less-emergent but more quantifiable threats... 

  • Comeback kid: Sanjay Kumar on Computer Associates' security strategy

    After a tumultuous several years, Sanjay Kumar believes Computer Associates' security strategy will be what leads the company back to the top. Also in this issue: Ed Skoudis examines the proliferation of combo malware and why the worst may be yet to ... 

  • Women of vision: How 25 leaders are shaping the industry's future

    Perhaps more than in any other IT discipline, information security is benefiting from the leadership of women. This month we profile more than two dozen women in IT security who are making their mark and making a difference. Also this month: establis... 

  • Buying spree: 2003 product survey results

    We examine the results of our 2003 product survey. Readers tell us that massive rollouts are in the works... that is, if enterprise information security budgets hold up. Also in this issue: a look at how four organizations handle the daunting task of...