Are you a security professional in the trenches? Now you can get the latest real-world advice on data protection, compliance policies, cutting-edge technologies, new security threats and more. Read every 2009 edition of Information Security magazine online.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
INFORMATION SECURITY MAGAZINE ONLINE
<class="text3"> November 2009
Stay in control
Unmanaged changes to IT systems and networks can recklessly increase risk to enterprises. The key is rolling out an accepted change management process, and sticking to it. Also in the Oct. issue: See what the Metasploit Project acquisition will do to the penetration testing market.
2009 Security 7 Awards
This month, the magazine announces the winners of the Security 7 Awards, which recognize the efforts and achievements of information security practitioners. Read about 7 individuals who had made an impact on the advancement of infosec technologies, policies and practices. Also in the Oct. issue: learn 9 ways to improve application security after an incident.
2009 Readers' Choice Awards: Your call on the industry's best
Once again, Information Security readers voted on their favorite enterprise security products. This year, a record 1721 voters weighed in, evaluating commercial tools in 17 different categories. Also in the Sept. issue: the truth and lies about encryption.
Controlling privileged accounts
Because economic pressures increase the risk of disgruntled employees, it is especially important to control and secure privileged accounts. Also in the July/August edition of Information Security magazine: UTM appliances are growing popular with midmarket companies.
SIMs: More than just a pile of logs
Today's SIMs have much greater functions than simple log aggregation and correlation; Diana Kelley reviews the latest features in security information management systems. Also: learn about a security pro's homegrown risk methodology that is currently being adopted by a university.
Automated compliance processes prevent a number of mistakes and allow corporate IT resources to be used more effectively. In the May 2009 edition of Information Security magazine, Richard E. Mackey Jr. reviews the most efficient ways to meet regulatory requirements. Also in this issue: the debate over the Cybersecurity Act of 2009.
Is DLP keeping your data where it should be?
Data leak prevention (DLP) technology implementation can be challenging and costly. In the April 2009 edition of Information Security magazine, database pro Rich Mogull reveals eight tips for getting the most out of DLP. Also in this issue: learn about the state of incident response and how to integrate log management with identity management.
The benefits of cloud computing and on-demand computing are certainly attractive, but what about security? Senior technology editor Neil Roiter examines deployment challenges in this month's edition of Information Security magazine. Also in this issue: find out the five ways a midmarket company can stay secure.
Have a look at Information Security magazine's yearly Priorities 2009 survey, which reveals the defenses that are on the top of security managers' list. Also in this month's edition: expert David Strom reveals ten ways to improve your threat posture in a down economy.
Look who's coming to dinner
In this month's issue, Information Security magazine looks inside the makings of a security steering comittee. Who should come to the table? Also: learn how internal auditors and information security teams can find common ground.