More from -- November 2006

Highlights from November edition of Information Security magazine

Welcome to's supplement to the latest issue of Information Security magazine. Now that you've read the magazine, explore this month's topics further on


 Securing mobile devices 
Today it is common for executives to use their handheld device as a critical business tool containing sensitive documents. How do you lock down these mobile devices and protect traffic in the air? Our new Messaging Security School addresses this and other problems with advice from leading experts including Tom Bowers, Michael Cobb, Lisa Phifer and others. 

Zeroing in on the midmarket 
Is the current-crop of enterprise-grade security technology a little too robust and expensive for your needs? takes a closer look at intrusion defense and ID and access management products designed specifically for the midmarket. Read the feature articles and listen to our expert podcasts. 

We Bring ISD to You 
Were you unable to make our annual Information Security Decisions conference held in Chicago last month? Go to to get many of the presentations from experts like Joel Snyder, Richard Mackey, Tom Bowers, Diana Kelley, Michael Cobb and many others.

Thwart hacking techniques
This month's issue of Information Security examines steganography, which is a method of hiding messages within a host file. If you're an enterprise security manager, it would be wise to familiarize yourself with the techniques hackers and insiders are using to steal data in plain view. This learning guide on the latest hacker techniques gives you a head start on malicious users.
>> Review our Thwarting Hacker Techniques Learning Guide.

Conduct a risk analysis
A well-crafted business impact analysis can be the difference between a minor outage and major trouble. This installment of's Risk Management Guide helps you identify asset value, vulnerabilities and threats to those assets, quantify the business impact posed by threats, and set goals for your risk analysis.
>> Read How to conduct a risk analysis

Deal with switches and segments
You know your copper-wire networks can be hacked, but fiber is crack-proof, right? Think again. There are tools readily available on the Internet that can expose network to outsiders. If you want to read more about fiber taps, check out this technical tip.
>> Read How to deal with switches and segments

PING with Aviel Rubin
In this exclusive interview with Information Security magazine, Aviel Rubin, author of Brave New Ballot, examines security problems in e-voting machines, and explains why isn't just a cause for concern, it's a matter of national security.
>> Read the interview with Aviel Rubin

October 2006 September 2006 August 2006 July 2006 June 2006 May 2006
April 2006 March 2006 February 2006 January 2006 December 2005 November 2005
October 2005 September 2005 August 2005 July 2005 June 2005 May 2005
This was last published in November 2006

Dig Deeper on Security vendor mergers and acquisitions

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.