PRO+ Premium Content/Information Security magazine
Access your Pro+ Content below.
Password pain relief

Passwords have long been the bane of both users' and IT's existence. They have been a nuisance for your employees to remember and your help desk to deal with. However, up-and-coming options are ready to help relieve you of the headache.
In this month's issue of Information Security magazine, learn more about the increasingly challenging issue of ensuring secure access to data and applications, as well as the different technologies that can help reduce the burden.
Additionally, take a look at the topic of computer forensics -- including four books worth investigating and how to build a forensics workstation.
Also in this issue: An interview with Becky Bace, the hype over intrusion prevention, information security surveys' trustworthiness and more!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Features in this issue
-
How to ease password security problems
Learn how self-service reset and password synchronization products are a new and cost-effective solution for easing enterprise password security problems.
-
Building blocks of an identity management system
Learn best practices for securing an identity management system for users inside and outside of the organization without reducing security effectiveness.
-
Becky Bace: The IDS security den mother
Former NSA employee and "den mother of computer security" Becky Base built an impressive and successful career that has undeniably influenced the industry.
-
Four computer forensics books worth investigating
Check out four computer forensics books that can help you learn the ins and outs of computer forensics technology and laws in place to manage cybercrime.
-
How a computer forensics investigation put two behind bars
A computer forensics investigation lead by a computer-savvy investigator followed a network trail from a murder probe to a digital trove of child pornography.
Columns in this issue
-
Information security buzz: What isn't intrusion prevention?
Although a broad term, the information security buzzword 'intrusion prevention' performs a valuable service for enterprises and is exciting vendors.
-
Can information security surveys be trusted?
Information security surveys aren't always reliable due to biased respondents and poorly selected subjects, which can lead to misleading results.
-
Secure reads: Wireless Security
Wireless Security offers a detailed overview of wireless security topics and covers big-picture characteristics of today's wireless security technologies.
-
E-Handbook
Single sign-on service requires a cloud-era update
Download -
E-Handbook
Achieve HIPAA compliance while keeping data secure
Download -
E-Handbook
The managed services trend reaches the software-defined WAN
Download -
E-Handbook
Biometrics and beyond: Online authentication techniques get personal
Download