More from --- February 2007

Highlights from the February 2007 issue of Information Security magazine

Information Security magazine's February issue examines the security of your organization's stored data and how imperative it is that backup tapes be encrypted. Taking that a step further, in this technical tip, expert W. Curtis Preston explains the importance of securing backup servers. Click through for six steps to beating backup server hacks.
Using IAM Tools to Improve Compliance
Provisioning and password management tools can not only ease complexity, reduce help desk calls and save money, but they may also solve some of your compliance problems. In a  new lesson in our Identity and Access Management Security School, guest instructor Tom Bowers explains how to use role management and provisioning in compliance, and helps you get ready to go shopping for the tools that can help your enterprise.

Backup Encryption Webcast
In this on-demand webcast expert W. Curtis Preston outlines essential practices and technologies for securing data throughout its "at-rest" lifecycle. Learn about various encryption options, plus Windows Encrypting File System, televaulting, tape drive, tape library and virtual tape library encryption. 

SearchSecurity at  RSA 2007

RSA Conference 2007 was no doubt one of the year's biggest information security events.'s news team was in San Francisco covering the conference with daily news updates, interviews, keynote coverage, analysis, podcasts and more. 
Newsmaker: David Maynor
Researcher David Mayor shocked attendees at last summer's Black Hat conference by demonstrating how attackers could target wireless cards to hijack notebook data. In this interview, he discusses the ramifications, threats that have since surfaced and wireless dangers that may still be lurking.

Achieving Compliance: A Real-World Roadmap
Are you proficient with the myriad global security and privacy regulations? Security officers must be well versed in governance and compliance, especially as enterprises do business across borders. These four downloads are important resources for your organization's compliance efforts.
>> Download these compliance resources.

Don't let trends dictate your network security strategy
Once you've digested our six steps to choosing an IPS, check out this bit of advice from expert Mike Chapple. Mike cautions your security officers not to get caught up in trends away from host-based IPS. Mike dispels some myths about HIPS, including the belief that they're difficult to manage and monitor.
>> Read Don't let trends dictate your network security strategy

The Architectural Model
Dig deep into the architecture weeds and download this architectural model prepared by security luminary Fred Cohen. This model explains the control architecture, which includes structural mechanisms that obtain security objectives through access control, functional units, perimeters, authorization, change control, and lower surety non-architectural units.
>> Review The Architectural Model

Information Security announces finalists for 2007 Readers' Choice awards
Information Security magazine asked its readers to rate the security products used and deployed within their organizations. More than 1,500 readers weighed in on more than 340 products. Rated by your peers, here are the top 5 finalists in 15 categories. The winners will be published in the April issue of Information Security.
>> Learn about the 2007 Readers' Choice finalists

PING with Josh Seeger
Josh Seeger, CIO of Tribune Broadcasting, a unit of the Tribune Company, talks exclusively about lessons learned when faced with the complex task of meeting the PCIDSS requirements. He also explains that while compliance can be burdensome, it can also serve as a window into your network's security posture.
>> Read the interview with Josh Seeger

January 2007 December 2006 November 2006 October 2006 September 2006 August 2006
July 2006 June 2006 May 2006 April 2006 March 2006 February 2006
January 2006 December 2005 November 2005 October 2005 September 2005 August 2005
This was last published in March 2007

Dig Deeper on Data privacy issues and compliance

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.