More from SearchSecurity -- January 2006
Highlights from the January 2006 issue of Information Security magazine.
![]() |
|
![]() |
![]() |
![]() |

Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on SearchSecurity.com.
![]() |
||||
|
![]() |
|||
![]() |
Don't Spring a Leak
Whether employees are acting maliciously or just carelessly, insiders account for the majority of customer data and intellectual property breaches. In our January cover story, we explored technology options for keeping confidential inside information secure. Now, we zero in on a new breed of host-based content monitoring tools that monitors individual machines to ensure that employee behavior adheres to corporate security policy. Join us for a webcast on Jan. 19 at noon EST to see how these products work. You'll learn how they assess where confidential information resides, prevent confidential information from leaving the network and can be centrally managed. (The webcast is available on demand after it debuts live.)
>> PREREGISTER HERE
Peak of Security
Internet Explorer's poor reputation for security has motivated many to migrate to other browsers. But IE 7.0, now in beta, promises to stave off cross-site scripting and attacks that exploit URL parsing, improve control over ActiveX, and add an antiphishing blacklist. This month, we pitted IE's new security features against its chief browser competitors, Netscape and Firefox. Now, read about the security features in Opera, another contender in the browser wars.
>> CLICK TO READ THIS TIP
Mining Netflow
Netflow data can be used to discover all sorts of harmful traffic, including spam Trojans in e-mail traffic, compromises on a firewalled server cluster, spyware infestation due to outbound traffic, and more. In Information Security magazine, you saw how to mine Netflow data to create homegrown anomaly detection. Now arm yourself with more tactics for detecting and preventing intrusions with SearchSecurity.com's learning guide.
>> CLICK TO GET THIS GUIDE
PING: Marcus Sachs
In an interview with Information Security magazine, Marcus Sachs, a deputy director in SRI's Computer Science Laboratory, explains what it means to support SRI's Washington D.C. operations of the U.S. Department of Homeland Security's Cyber Security R&D Center, and how public and private enterprises play an important role in the process.
>> CLICK TO READ THE INTERVIEW
HIGHLIGHTS ARCHIVES |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
December 2005 | November 2005 | October 2005 | September 2005 | August 2005 | July 2005 |
![]() |
![]() |
![]() |
|||
June 2005 | May 2005 | April 2005 |
Start the conversation
0 comments