Information Security
Today's Security News RSS Feeds Sign up for Security RSS feeds 

Certification still pays for CISSPs, CISMs
ARTICLE - New survey results from Foote Partners, finds security pros who have earned their CISSP, CISM or GIAC Security Expert certification are among those whose salaries continue to rise.
More on CISSP Certification

McAfee to acquire Secure Computing
ARTICLE - McAfee announces its intention to acquire Web and network security company Secure Computing for $465 million.
More on Security Vendor Mergers and Acquisitions

Microsoft opens up secure development program
ARTICLE - Microsoft is extending its Security Development Lifecycle processes to third parties.
More on Secure Software Development

Webcast: Network Access Control
WHAT'S NEW - Even though NAC has overcome some of its issues, the technology can still be complex. This webcast provides guidance for security managers about to embark on a NAC evaluation.

What's New...
Secure Messaging Virtual Seminar
Available On Demand!
Focused on Finance?
Missed our Financial Information Security conference? Download the content!
10 Second Site Sign-Up
Receive site updates, white papers and more!
Send your suggestions to the editorial teams of SearchSecurity.com
and Information
Security
  SPECIAL SECTION
  GET E-MAIL UPDATES
Receive Security-related news, tech tips, and more delivered directly to your Inbox. Sign-up by selecting one or more topics and submit your e-mail address below.
  Security IT Downloads
  Security Wire Perspectives
  Security Wire Daily
Not a member? We'll activate your FREE membership with your subscription.
MEMBER BENEFITS
Information Security Quizzes
Member Benefits

SECURITY TOPICS
Network Security
Network Architecture, Virtual Private Network (VPN), Intrusion Detection/Analysis, Wireless Security
Identity management and access control
Identity Management, Authentication, Web Access Control
Platform Security
OS security, Secure Data Storage, Vulnerability Management, Virtualization Security
Application Security
Email Security, Web Security, IM Security, Application Firewalls, Database Security, Secure Software Development, Securing Productivity Applications
Open Source Security Tools
Information Security Threats
Viruses, worms and other malware, Spyware, Adware and Trojans, Rootkits, Identity Theft and Data Security Breaches, Web Threats, Email and Messaging Threats, Emerging Information Security Threats...
Security Management
Market Trends, Predictions & Forecasts, Security News Makers, Audit and Compliance, Information Security Standards, Laws, Investigations and Ethics, Enterprise Risk Management...
Information Security Careers, Training and Certifications
Information Security Jobs, Information Security Certifications, Information Security Training

SECURITY INFO CENTERS
SearchSecurity.com Info Centers offer IT professionals in-depth news and technical advice on the hottest topics in the Security industry.
Lumension Security Data Protection
SPONSORED BY: Lumension Security
Vulnerability Management Topical
SPONSORED BY: Lumension Security
(ISC)2 Topical
SPONSORED BY: (ISC)2
PKI and Layered Security
SPONSORED BY: Entrust
Best Practices for Preventing Identity Thefts and Breaches
SPONSORED BY: Guardium
Single Sign-On
SPONSORED BY: Quest
Audit and Compliance
SPONSORED BY: Tripwire
Spyware, Trojans, and Rootkits
SPONSORED BY: ESET
IBM Governance and Risk Management
SPONSORED BY: IBM
Kaspersky Lab Virus, Worms, and Other Malware
SPONSORED BY: Kaspersky Lab

SITE HIGHLIGHTS

How to patch Kaminsky's DNS vulnerability: Mike Chapple details why the recently discovered DNS flaw could be devastating, and what organizations should do to protect their end users...

Screencast: Wikto assesses Web servers: Wikto may not test for SQL injections, but it is still an essential tool for penetration testers who are looking for vulnerabilities in their ...

Little Black Book of Computer Security: Read a section from Joel Dubin's book, "The Little Black Book of Computer Security, 2nd edition", in which he details how to comply with today...


MORE NEWS

Certification still pays for CISSPs, CISMs
ARTICLE - New survey results from Foote Partners, finds security pros who have earned their CISSP, CISM or GIAC Security Expert certification are amon...

IronPort feature detects exploited websites
ARTICLE - IronPort's cloud scanning feature classifies sites based on the risk they pose.

McAfee to acquire Secure Computing
ARTICLE - McAfee announces its intention to acquire Web and network security company Secure Computing for $465 million.

Microsoft opens up secure development program
ARTICLE - Microsoft is extending its Security Development Lifecycle processes to third parties.

Forever 21 security breach compromises nearly 99,000 payment cards
ARTICLE - The retailer learned of the intrusion after a Department of Justice indictment last month.


MORE NEWS

SITE INDEX
Security. Security news, technical tips and industry experts available at your fingertips! Use our site map below to navigate resources on top of mind topics such as: Authentication, Email Security, Firewalls, Intrusion Prevention, and SSL (Secure Socket Layer).
SITE FEATURES

All-in-One Guides

Ask the Experts

Downloads

Events & Conferences

Featured Topic

Glossary

Information Security Magazine

ITKnowledge Exchange

Meet the Editors

Multimedia

News

Polls

Products & Vendors

Readers' Choice

RSS

Search

Security Schools

Security Topics

Tips & Newsletters

Video

White Papers

VIEW ENTIRE SITE INDEX


COVER STORY

Companies Finding a Place for Maturing NAC Projects
by David Strom
Four case studies examine how network access control (NAC) projects are faring in the enterprise, and how they're helping with device discovery and policy enforcement, but remediation remains a challenge.
READ FULL STORY
FREE SUBSCRIPTION

SEPTEMBER TABLE OF CONTENTS

Security of Microsoft SQL Server 2008 Improves over Previous Versions

Mix of Frameworks and GRC Satisfy Compliance Overlaps

GRC: Over-Hyped or Legit?

Viewpoint

Security Certifications' Ethics Programs Merely Window-Dressing

Shared Identity Providers Could Soothe Password Chaos

Interview: Bill Jiminez, Systems Architect at the University of the Pacific
VIEW CURRENT ISSUE
VIEW ARCHIVES


Compare Security Software Resellers, Integrators and OEMs
TechTarget Security Media
Information Security View this month\\'s issue and subscribe today.
Information Security Decisions Apply online for free conference admission.
SearchSecurity.com
NewsMagazineMultimediaWhite PapersLearningAdviceTopicsEventsAbout Us

About Us  |  Contact Us  |  For Advertisers  |  For Business Partners  |  Site Index  |  RSS
Get IT answers from your peers at IT Knowledge Exchange
Attend free technology-specific conferences, seminars and events. View listings at TechTarget Events | TechTarget Expert Answer Center
TechTarget Technology-Specific IT Media and Events
CIO and IT Management
SearchCIO.com
SearchCIO-Midmarket.com
CIO Decisions Conference

Storage
SearchStorage.com
SearchDataBackup.com
SearchSMBStorage.com
Storage Magazine
Storage Decisions Conference and Seminars
SearchStorage.co.uk

Data Center
SearchDataCenter.com
SearchServerVirtualization.com
SearchVMware.com
Search400.com
SearchEnterpriseLinux.com
Data Center Decisions Conference and Seminars

Windows and Distributed Computing
SearchWinIT.com
SearchExchange.com
SearchSQLServer.com
SearchEnterpriseDesktop.com
SearchWindowsServer.com
SearchDomino.com
Labmice.net

Networking
SearchNetworking.com
SearchUnifiedCommunications.com
SearchMobileComputing.com
SearchTelecom.com

Security
Information Security Magazine
SearchSecurity.com
SearchFinancialSecurity.com
Information Security Decisions Conference
SearchSecurity.co.uk

Application Development
TheServerSide.com
TheServerSide.NET
Ajaxian.com
SearchSoftwareQuality.com
SearchSOA.com
SearchWinDevelopment.com
TheServerSide Java Symposium
The Ajax Experience Conference

Enterprise Applications
SearchCRM.com
SearchDataManagement.com
SearchOracle.com
SearchSAP.com
SearchManufacturingERP.com

Laptops and Mobile Technology
NotebookReview.com
TabletPCReview.com
Brighthand.com
DigitalCameraReview.com
SpotStop.com

Vertical Software
2020software.com
ConstructionSoftwareReview.com

Channel
SearchITChannel.com
SearchStorageChannel.com
SearchSecurityChannel.com
SearchSystemsChannel.com
SearchNetworkingChannel.com

Explore Bitpipe.com and KnowledgeStorm.com for information technology white papers and case studies
Visit WhatIs.com a glossary of computer terms and learning resources

TechTarget Corporate Web Site  |  Media Kits  |  Reprints  |  Site Map




All Rights Reserved, Copyright 2003 - 2008, TechTarget | Read our Privacy Policy
  TechTarget - The IT Media ROI Experts