PRO+ Premium Content/Information Security magazine
Access your Pro+ Content below.
Real-world solutions for data loss prevention

This month's issue of Information Security Magazine is centered on Data Protection. We've got articles covering Data Loss Prevention solutions and how they work in the real world, Log Management as it pertains to security forensics in the case of an unfortunate security event, and some compliance lessons from Delaware's Dept. of Technology.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Features in this issue
-
Tabletop exercises sharpen security and business continuity
Delaware's Dept. of Technology and Information conducts annual incident response exercises that test the readiness of state agencies to respond to real attacks. Learn how simulated cyberattacks and incident response exercises help organizations prevent future attacks and maintain business continuity.
-
Tying log management and identity management shortens incident response
Tying log management to user identity shortens incident response and forensics investigation cycles. Learn how compliance has mandated that organizations determine not only when incidents occurred, but who is responsible for unauthorized access.
Columns in this issue
-
Sell the business on virtualization security
Executive management sees virtualization as the cure-all, but CISOs need to ensure it is done securely. Learn how virtualization can help you position security as a business enabler.
-
SaaS security risks must be addressed
Realize quickly that software as a service and cloud computing are the future computing infrastructures IT must secure.
-
E-Handbook
21st century data security model: Can tech save us from ourselves?
Download -
E-Handbook
How to reap the benefits of unified communications security
Download -
E-Handbook
An edge computing architecture upends the data center
Download -
E-Handbook
Crafting a cybersecurity incident response plan, step by step
Download