Email Alerts
-
Mergers and acquisitions: Building up security after an M&A
Mergers and acquisitions are common headlines in today's information security world, and that's great news for malicious hackers and data thieves. When companies join forces, they often leave themselves open to attack. In this tip, contributor Ed Sko... Tip
-
Ensuring Web application security during a company merger
When companies merge, so must their Web application infrastructures. Securing and integrating applications, however, can be a struggle without cooperation from all sides. In this tip, Michael Cobb explains how a merged organization can avoid turf bat... Tip
-
Best practices for compliance during a merger
Company mergers involve more than just aligning two different security infrastructures. When one vendor acquires another, it's the handling of compliance issues that can be an IT security staff's toughest task. In this tip, security expert Joel Dubin... Tip
-
2006 Products of the Year: Antispyware
Information Security and SearchSecurity readers selected the best desktop and gateway enterprise antispyware products of 2006. Tip
-
Patch testing on a budget
While it is best to test patches prior to production, testing environments can be costly. This tip explains how to reduce these costs. Tip
-
Secure Sphere 2.0
In this review, Information Security magazine contributor Peter Giannacopoulos evaluates the strengths and weaknesses of Imperva's SecureSphere 2.0. Tip
-
Symantec's Symantec Mail Security 8200 series
Information Security magazine reviews the strengths and weaknesses of Symantec's Mail Security 8200 series. Tip
-
How to write an RFP
The principles of Six Sigma can be applied to the process of writing a request for proposal. Tip
-
Salespeople are sharks and other truths of negotiation
Learn what you should do to ensure your next technology is a success. Tip
-
Demand good proposals: Tips for writing an RFP
Learn five guidelines that will improve prospects for proposals that actually respond directly to your requirements. Tip
Security Management Strategies for the CIO