Information Security magazine's February issue examines the security of your organization's stored data and how imperative it is that backup tapes be encrypted. Taking that a step further, in this technical tip, expert W. Curtis Preston explains the importance of securing backup servers. Click through for six steps to beating backup server hacks.
Achieving Compliance: A Real-World Roadmap
>> Download these compliance resources
Don't let trends dictate your network security strategy
Once you've digested our six steps to choosing an IPS, check out this bit of advice from SearchSecurity.com expert Mike Chapple. Mike cautions your security officers not to get caught up in trends away from host-based IPS. Mike dispels some myths about HIPS, including the belief that they're difficult to manage and monitor.
>> Read Don't let trends dictate your network security strategy
The Architectural Model
Dig deep into the architecture weeds and download this architectural model prepared by security luminary Fred Cohen. This model explains the control architecture, which includes structural mechanisms that obtain security objectives through access control, functional units, perimeters, authorization, change control, and lower surety non-architectural units.
>> Review The Architectural Model
Information Security announces finalists for 2007 Readers' Choice awards
Information Security magazine asked its readers to rate the security products used and deployed within their organizations. More than 1,500 readers weighed in on more than 340 products. Rated by your peers, here are the top 5 finalists in 15 categories. The winners will be published in the April issue of Information Security.
>> Learn about the 2007 Readers' Choice finalists
PING with Josh Seeger
Josh Seeger, CIO of Tribune Broadcasting, a unit of the Tribune Company, talks exclusively about lessons learned when faced with the complex task of meeting the PCIDSS requirements. He also explains that while compliance can be burdensome, it can also serve as a window into your network's security posture.
>> Read the interview with Josh Seeger
|January 2007||December 2006||November 2006||October 2006||September 2006||August 2006|
|July 2006||June 2006||May 2006||April 2006||March 2006||February 2006|
|January 2006||December 2005||November 2005||October 2005||September 2005||August 2005|