Sponsor

2012/02/15

February Information Security magazine: Up your malware game

February 2012 Published by TechTarget
Information Security Magazine Online
The most authoritative award-winning resource for those charged with reducing enterprise risk
Information Security Magazine Online
Magazine Cover
In this issue:
- New Platforms, New Threats
- Tackling the Mobile Security Challenge
- Online Insecurity
- Do Security Researchers Go Too Far?
Indiana,

It’s no secret – new applications are plagued by the likelihood of new threats. And in today’s world of endlessly evolving technology trends, it’s more crucial than ever to safeguard your latest platform of choice. At the same time, we mustn’t forget that malware – our eternal nemesis – is just as good (and often better) at taking on the latest technology trends with ease. 

In February’s edition of Information Security magazine, independent security consultant, Lisa Phifer, uncovers why enterprises need to step up their game – as attackers increasingly target these new vectors with targeted malware – and implement new antimalware protection strategies that are specifically designed to mitigate these multifaceted threats.

Access this month's Information Security Magazine cover story here.
 
Have you earned your 2012 CPE credits with Information Security Magazine yet? Take our quiz today and secure your credits
Feature Stories:
Tackling the Mobile Security Challenge
Today's onslaught of smartphones into the enterprise has put mobile device security risks at the top of the agenda for many organizations - requiring your managers to be armed and ready to fight against such threats as viruses, worms and spyware on multiple fronts. Explore the latest mobile device protection strategies for securing your applications now.
Access this article here
ACCESS RELATED CLOUD CONTENT HERE:
- Expert E-Guide: Android Security Settings and Controls for Android Enterprise Security
- Video: Nipping malware in the bud
- Whitepaper: Escalating Targeted Web and Email Attacks
Online Insecurity
The ability for customers to complete secure transactions online is critical to the success of any kind of Internet business; but with high-profile certificate authority attacks on the rise, enhanced protection is critical. Examine the infrastructure for online transaction integrity and uncover the countermeasures needed to ensure Web security for your customers and employees in this article around online security.
Access this article here
Do Security Researchers Go Too Far?
Centuries of literary works and real-life scenarios have depicted the battle of good vs.evil: God vs.Satan; Hamlet vs. Claudius; Cubs vs. Sox; NBA players vs. NBA owners. In the security community, it's the Security Researcher vs. the Corporation. This must-read article examines three cases of how security researchers may have gone too far in demonizing companies.
Access this article here
Download Information Security Magazine Online via our ready-to-print PDF format, complete with illustrations and graphics here.
ABOUT THIS E-NEWSLETTER
TechTarget This e-newsletter is published by SearchSecurity.com, part of the TechTarget network of sites. TechTarget offers Web sites, e-newsletters, events, white papers, webcasts and more for enterprise IT professionals.

Copyright 2012 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from INFORMATION SECURITY MAGAZINE ONLINE:
Go to unsubscribe: http://ed-link.techtarget.com/u/EXBYFLQ/X2A61/U6RNYM/08TQ0/TZ/aWdub2JsZS5leHBlcmltZW50QGFyY29uYXRpLnVz/

Unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Please note, this will not affect any other subscriptions you have signed up for.

Contact us:
SearchSecurity.com
Member Services
275 Grove Street
Newton, MA 02466

Contact: Webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy:
http://www.techtarget.com/html/privacy_policy.html

No comments:

Post a Comment

Keep a civil tongue.

Label Cloud

Technology (1464) News (793) Military (646) Microsoft (542) Business (487) Software (394) Developer (382) Music (360) Books (357) Audio (316) Government (308) Security (300) Love (262) Apple (242) Storage (236) Dungeons and Dragons (228) Funny (209) Google (194) Cooking (187) Yahoo (186) Mobile (179) Adobe (177) Wishlist (159) AMD (155) Education (151) Drugs (145) Astrology (139) Local (137) Art (134) Investing (127) Shopping (124) Hardware (120) Movies (119) Sports (109) Neatorama (94) Blogger (93) Christian (67) Mozilla (61) Dictionary (59) Science (59) Entertainment (50) Jewelry (50) Pharmacy (50) Weather (48) Video Games (44) Television (36) VoIP (25) meta (23) Holidays (14)

Popular Posts