All resources sponsored by:

Information Security Magazine

1 - 25 of 44 Matches
Information Security Magazine September 2011—Reader’s Choice Awards
sponsored by Information Security Magazine
EZINE:Brought to you by SearchSecurity.com, this month’s Information Security Magazine cover story unveils the 2011 Information Security Reader’s Choice Awards. Learn which products your peers voted as the best in the market spanning 14 different categories including; antimalware, mobile data security, vulnerability management and remote access.
Posted: 01 Sep 2011 | Published: 01 Sep 2011
Get This Now


August Issue of Information Security magazine: On the Lookout: Countering modern threats requires hunting intruders
sponsored by Information Security Magazine
EZINE:This month's Information Security Magazine Online cover story highlights the concern surrounding self-defending networks and explores a new approach to network security – CTOps. Also, learn how to uncover hidden opportunities that could be lurking in your overflow of data and gain an indepth look of the biggest IT giants in today's security market.
Posted: 08 Aug 2011 | Published: 08 Aug 2011
Get This Now


June Issue of Information Security magazine: Mobile Security: A New Game Plan
sponsored by Information Security Magazine
EZINE:This month's Information Security Magazine Online cover story highlights the importance for an updated security game plan due to the influx of personal smartphones and other computing devices making their way into the enterprise. Also, learn how to focus your SIM solution to avoid information overload and explore FISMA challenges.
Posted: 02 Jun 2011 | Published: 02 Jun 2011
Get This Now


May Issue of Information Security Magazine: Data Protection: Going the Distance
sponsored by Information Security Magazine
EZINE:This month’s Information Security cover story explores the practical ways you can avoid mishaps by building on the technical specifications of compliance requirements like PCI DSS. Learn to focus your efforts on not only satisfying these compliance mandates, but also create a robust, comprehensive information security program at the same time.
Posted: 05 May 2011 | Published: 05 May 2011
Get This Now


April Issue of Information Security Magazine: Cloud Migration: Look before you leap
sponsored by Information Security Magazine
EZINE:This month’s Information Security Magazine Online cover story explores the need for careful planning when migrating to the cloud. The benefits of cloud computing are real; a lower IT profile, faster provisioning, and the global availability of new services hold incredible value for most organizations.
Posted: 05 Apr 2011 | Published: 05 Apr 2011
Get This Now


Information Security Magazine: “Health Care Data Protection”
sponsored by Information Security Magazine
EGUIDE:This month’s Information Security Magazine Online cover story dissects the recent HIPAA revisions made by the HITECH Act.
Posted: 15 Mar 2011 | Published: 15 Mar 2011
Get This Now


March Issue of Information Security magazine: “Virtual Certainty: VMs introduce a new security dynamic”
sponsored by Information Security Magazine
EZINE:This month’s Information Security Magazine Online cover story explores the need for sound security and risk management strategies around virtualization technology.
Posted: 04 Mar 2011 | Published: 04 Mar 2011
Get This Now


February Issue of Information Security magazine: “Safety Check: Enforcing endpoint security requires careful planning and deployment”
sponsored by Information Security Magazine
EGUIDE:This month’s Information Security Magazine Online cover story explores the current state of endpoint security enforcement and the challenges enterprises face during implementation.
Posted: 02 Feb 2011 | Published: 31 Jan 2011
Get This Now


Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act
sponsored by Information Security Magazine
EZINE:This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations.
Posted: 09 Dec 2010 | Published: 09 Dec 2010
Get This Now


November Information Security Magazine - Re-architect Your Provisioning System Into a First Line of Defense for Access Management
sponsored by Information Security Magazine
EZINE:November's edition of Information Security Magazine covers a variety of IT security related topics. Check out this e-zine to learn about re-architecting your provisioning system, meeting mandates in the cloud, how the economy is affecting information security professionals, and much more!
Posted: 10 Nov 2010 | Published: 10 Nov 2010
Get This Now


Essential Guide to SIMs Strategy
sponsored by Information Security Magazine
EGUIDE:Take an incremental approach to security information and event management. Start slow, narrow your goals and be patient with these expensive and complex tools, otherwise data overload will bring you down. Read this guide to find out so much more.
Posted: 26 Oct 2010 | Published: 26 Oct 2010
Get This Now


Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor
sponsored by Information Security Magazine
WHITE PAPER:This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.
Posted: 07 Oct 2010 | Published: 07 Oct 2010
Get This Now


Your September Issue of Information Security Magazine– Readers’ Choice Awards
sponsored by Information Security Magazine
EGUIDE:In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.
Posted: 10 Sep 2010 | Published: 10 Sep 2010
Get This Now


Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity
sponsored by Information Security Magazine
WHITE PAPER:The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more.
Posted: 21 Jul 2010 | Published: 21 Jul 2010
Get This Now


E-Guide: Information Security Essential Guide to Compliance
sponsored by Information Security Magazine
ESSENTIAL GUIDE:Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.
Posted: 06 Jul 2010 | Published: 06 Jul 2010
Get This Now


Information Security Magazine – June 2010: Laptop Lockdown
sponsored by Information Security Magazine
EZINE:This month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and a debate over hiring convicted hackers. Read these great articles and more in this month’s issue.
Posted: 16 Jun 2010 | Published: 16 Jun 2010
Get This Now


Information Security Magazine: May 2010 - Data: Do you know where it’s going?
sponsored by Information Security Magazine
EZINE:This month’s cover story deals with database activity monitoring and how to keep vigilant watch over your data. Other features cover new stealthy and sophisticated malware that aims at hijacking business banking accounts and Windows 7 operating system security improvements. Read on and take a look at all three featured articles and much more.
Posted: 03 May 2010 | Published: 03 May 2010
Get This Now


Information Security Magazine - April 2010: Endpoints on the Loose
sponsored by Information Security Magazine
EZINE:This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subjects and more.
Posted: 07 Apr 2010 | Published: 07 Apr 2010
Get This Now


Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’
sponsored by Information Security Magazine
EZINE:This month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more.
Posted: 09 Mar 2010 | Published: 09 Mar 2010
Get This Now


Information Security Magazine - February 2010: Under Control
sponsored by Information Security Magazine
EZINE:Feature articles this month cover bringing data loss prevention coverage to mobile endpoints, readers’ security priorities and top investments for 2010, and new compliance mandates in Massachusetts and Nevada that signal a new generation of data protection laws. Read on for these great articles and more.
Posted: 03 Feb 2010 | Published: 03 Feb 2010
Get This Now


Information Security Magazine - December 2009 / January 2010: Basic Database Security
sponsored by Information Security Magazine
EZINE:This issue of information security magazine provides a step-by-step guide to securing database systems, explores the important factors in selecting a SaaS provider, presents a whole new approach to security management that has nothing to do with structure-driven policy architecture, and more.
Posted: 14 Dec 2009 | Published: 14 Dec 2009
Get This Now


Information Security Magazine November 2009: Stay in Control
sponsored by Information Security Magazine
EZINE:Unmanaged changes to IT systems and networks can recklessly increase risk to enterprises. The key is rolling out an accepted change management process, and sticking to it. Read this magazine and find out how a consistent change management process puts you in charge.
Posted: 16 Nov 2009 | Published: 16 Nov 2009
Get This Now


Information Security Magazine - October 2009: Security 7 Awards
sponsored by Information Security Magazine
EZINE:The big news in this month's issue is the announcement of the winners of the fifth annual Security 7 Award. Other featured articles present tips for preventing future incidents and also explain how SOX compliance is hitting smaller public companies harder than the big guys. Read on for these great articles and more.
Posted: 13 Oct 2009 | Published: 13 Oct 2009
Get This Now


Information Security Magazine - September 2009: Readers’ Choice Awards
sponsored by Information Security Magazine
EZINE:This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.
Posted: 15 Sep 2009 | Published: 15 Sep 2009
Get This Now


Essential Guide to PCI DSS
sponsored by Information Security Magazine
EGUIDE:This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.
Posted: 14 Sep 2009 | Published: 14 Sep 2009
Get This Now


1 - 25 of 44 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement