PRO+ Premium Content/Information Security

Thank you for joining!
Access your Pro+ Content below.
June 2007

Fellow practitioners are best security resources

In times of limited budgets and resources, user groups may offer just the advice and camraderie you need. I had the pleasure a few months back to attend the Agora security user group meeting in Seattle. Agora was formed more than 10 years ago to bring security professionals, law enforcement and government together to help thwart cyberattacks. My takeaway: If busy schedules have prevented you from joining a local user group or professional organization, I would recommend you make the time to do so. First, it provides a place to bounce ideas and offers a perspective you may not get in the confines of your office. And second, it is a good way to network and meet other security professionals as part of your career development. At Agora, it was easy to see some very strong relationships had formed. While a quarterly Northwest regional event, many participants travel cross-country to attend. Participants span the spectrum--from well known Fortune 500 corporations, to smaller entities, to federal, state and local government. Typically ...

Access this PRO+ Content for Free!

Features in this issue

  • SIMs maturing and suitable for mid-market

    Security information management systems (SIMs) tools have expanded with more capabilities such as active threat response. The broadening of the technology will provide security managers with a sharper view of their overall security posture.

  • Product review: nCircle Configuration Compliance Manager

    nCircle Configuration Compliance Manager brings policy compliance and secuirty management into one centralized software suite. It provides vulnerability scanning via third-party scanners such as Nessus. This product review rates the software's ease of installation, features and effectiveness.

  • Encryption key management blunders can render deployments useless

    Encryption sounds like an ideal way to protect data but key management, including accountability, training, and enforcement of password complexity, are challenging.

Columns in this issue