Information Security magazine online 2009: Now available on demand

Misc

Information Security magazine online 2009: Now available on demand

Are you a security professional in the trenches? Now you can get the latest real-world advice on data protection, compliance policies, cutting-edge technologies, new security threats and more. Read every 2009 edition of Information Security magazine online.

Continue Reading This Article

Enjoy this article as well as all of our content, including E-Guides, news, tips and more.

   November 2009
   October 2009
   September 2009
   July/August 2009
   June 2009
   May 2009
   April 2009
   March 2009
   February 2009
   January 2009


INFORMATION SECURITY MAGAZINE ONLINE

November 2009
Stay in control
Unmanaged changes to IT systems and networks can recklessly increase risk to enterprises. The key is rolling out an accepted change management process, and sticking to it. Also in the Oct. issue: See what the Metasploit Project acquisition will do to the penetration testing market.






October 2009
2009 Security 7 Awards
This month, the magazine announces the winners of the Security 7 Awards, which recognize the efforts and achievements of information security practitioners. Read about 7 individuals who had made an impact on the advancement of infosec technologies, policies and practices. Also in the Oct. issue: learn 9 ways to improve application security after an incident.





September 2009
2009 Readers' Choice Awards: Your call on the industry's best
Once again, Information Security readers voted on their favorite enterprise security products. This year, a record 1721 voters weighed in, evaluating commercial tools in 17 different categories. Also in the Sept. issue: the truth and lies about encryption.






July/August 2009
Controlling privileged accounts
Because economic pressures increase the risk of disgruntled employees, it is especially important to control and secure privileged accounts. Also in the July/August edition of Information Security magazine: UTM appliances are growing popular with midmarket companies.






June 2009
SIMs: More than just a pile of logs
Today's SIMs have much greater functions than simple log aggregation and correlation; Diana Kelley reviews the latest features in security information management systems. Also: learn about a security pro's homegrown risk methodology that is currently being adopted by a university.






May 2009
Automating compliance
Automated compliance processes prevent a number of mistakes and allow corporate IT resources to be used more effectively. In the May 2009 edition of Information Security magazine, Richard E. Mackey Jr. reviews the most efficient ways to meet regulatory requirements. Also in this issue: the debate over the Cybersecurity Act of 2009.






April 2009
Is DLP keeping your data where it should be?
Data leak prevention (DLP) technology implementation can be challenging and costly. In the April 2009 edition of Information Security magazine, database pro Rich Mogull reveals eight tips for getting the most out of DLP. Also in this issue: learn about the state of incident response and how to integrate log management with identity management.





March 2009
Sky-high risk?
The benefits of cloud computing and on-demand computing are certainly attractive, but what about security? Senior technology editor Neil Roiter examines deployment challenges in this month's edition of Information Security magazine. Also in this issue: find out the five ways a midmarket company can stay secure.






February 2009
Budget squeeze
Have a look at Information Security magazine's yearly Priorities 2009 survey, which reveals the defenses that are on the top of security managers' list. Also in this month's edition: expert David Strom reveals ten ways to improve your threat posture in a down economy.








January 2009
Look who's coming to dinner
In this month's issue, Information Security magazine looks inside the makings of a security steering comittee. Who should come to the table? Also: learn how internal auditors and information security teams can find common ground.

Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

This was first published in April 2009

 

COMMENTS powered by Disqus  //  Commenting policy