Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on SearchSecurity.com.
Keeping the Oil & Data Flowing
by Mike Mimoso
Oil giant ChevronTexaco has baked risk management into each of its business processes and made data protection an integral part of its practices. It's easy to understand why since the company stores more than 500 terabytes of technical data around oil field exploration activities and generates 350 terabytes each year for seismic projects. Part of ChevronTexaco's strategy involves consolidating its data management policies. In this on-demand webcast, hear how you can find trigger points that indicate your corporate security policies should be updated and why risk assessment results are essential for developing sound policies.
>> CLICK TO LISTEN TO THIS WEBCAST
>> An SQL injection attack is a major threat to backend data. Get tactics for protecting your sites and information.
>> SearchSecurity's monthly Risk Management Strategies newsletter arms you with real-world techniques for enterprise risk management, metrics and measurement, business continuity, top-line security policies, procedures and guidelines, and standards adoption. Sign up today.
Perspectives: Linux v. Windows
Is Windows really easier to lock down than Linux? A controversial report from Security Innovation has a lot of IT professionals talking. Read what your peers have to say and then share your thoughts on whether the Penguin plays second fiddle when it comes to security.
>> CLICK TO SEE OUR USERS' SOUNDOFF POSTS
>> Click to read security consultant Ira Winkler's analysis
Ping: MassMutual's Bruce Bonsall
MassMutual Financial Group CISO Bruce Bonsall relays the process his organization uses to ensure that security is factored into every IT project. Read how Bonsall learned to speak in a language business folks could understand.
>> CLICK TO READ THE ARTICLE
Identity Management: Managing Federated Relationships
Federated identity management simplifies and protects the online registration and access control process for consumers and extranet partners. SAML is the protocol for leveraging federated relationships. Information Security contributor Dick Mackey goes online with a webcast that demystifies SAML. He also shares technical advice on the dangers of using XML and the extent to which new devices can help you filter out XML-based attacks. >> CLICK TO PREREGISTER FOR THE WEBCAST
>> Learn more about keeping XML secure with our XML Security Learning Guide.
>> Read about the progress in ratifying security standards like SAML 2.0.
| E-mail Security School
Learn tactics for securing your e-mail systems in this three lesson course led by our guest instructor, Joel Snyder. Participants who register with a valid e-mail address and attend all three course webcasts will receive a certificate of completion from SearchSecurity.com. In addition, through our agreement with (ISC)², all CISSPs and SSCPs can earn 1 CPE credit per lesson webcast.