Monday, August 29, 2005

This Week: Your one-stop shop for learning tools

SEARCHSECURITY.COM
This Week
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

A newsletter from TechTarget
August 29, 2005

IN THIS ISSUE:
> From the Editor: Check out our Security Learning Guide Library
> SearchSecurity.com Exclusives: Phishing: The business risks and
strategies for mitigating them
> ITKnowledge Exchange: Creating subnets for a remote office
> Site Highlights: Full session descriptions and
conference-at-a-glance now available for ISD Fall 2005
> White Papers: Intuitive and Robust Patch Management
> Webcasts: IPS and the Next Wave of Network Security

FROM THE EDITOR
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

Check out our Security Learning Guide Library
[by Jenny Wiseman]
jwiseman@techtarget.com

Did you know SearchSecurity.com has a repository of security Learning
Guides? These educational tools are designed to be your one-stop shop
for learning about specific security topics. Each guide includes the
latest news articles, tips, expert advice, chapter downloads,
webcasts and more, to arm you with the tactics you need to keep data
and systems secure.
SearchSecurity.com's Security Learning Guides:
http://searchsecurity.techtarget.com/general/0,295582,sid14_gci1119344,00.html?track=NL-105&ad=525687

Our newest guide targets SAP security and is designed to help SAP
professionals bulletproof their systems. It covers everything from
authentication and RFID to compliance and auditing.
SAP Security Learning Guide:
http://searchsecurity.techtarget.com/general/0,295582,sid14_gci1118478,00.html?track=NL-105&ad=525687

You can find all of our guides in our Security Learning Guide
Library. Some of the hot topics we cover include Firewalls, VoIP,
Thwarting Hacker Techniques and Snort, to name a few. Check out all
these and more in our library. If there's a guide you would like to
see on SearchSecurity.com, please send an e-mail to
mailto:editor@searchsecurity.com and let us know.

Firewall Learning Guide:
http://searchsecurity.techtarget.com/generic/0,295582,sid14_gci1093527,00.html?track=NL-105&ad=525687
VoIP Learning Guide:
http://searchsecurity.techtarget.com/generic/0,295582,sid14_gci1094388,00.html?track=NL-105&ad=525687
Thwarting Hacker Techniques Learning Guide:
http://searchsecurity.techtarget.com/generic/0,295582,sid14_gci1099349,00.html?track=NL-105&ad=525687
Snort Technical Guide:
http://searchsecurity.techtarget.com/general/0,295582,sid14_gci1083823,00.html?track=NL-105&ad=525687

SEARCHSECURITY.COM EXCLUSIVES
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

Phishing: The business risks and strategies for mitigating them
By now, most end users realize that phishing is a form of identity
theft. However, why should IT and security managers worry about this
significant threat? This tip explains why phishing is a business
issue and highlights what some organizations are doing to protect
themselves and their customers.
http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci1118183,00.html?track=NL-105&ad=525687

Choosing the right firewall topology: Bastion host, screened subnet
or dual firewalls
Deciding where to place your network's firewall is a common problem
organizations face when developing a perimeter protection strategy.
This tip takes a closer look at the three basic firewall options and
offers suggestions to help determine where your firewall will be most
effective.
http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci906407,00.html?track=NL-105&ad=525687

Avoid the hazards of unvalidated Web application input
An attacker can easily obtain sensitive information or attack a Web
site if user-submitted information isn't properly validated. So
what's a programmer to do? This tip examines how unvalidated input
works and what programmers can do to properly secure Web
applications.
http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci1118297,00.html?track=NL-105&ad=525687

ITKNOWLEDGE EXCHANGE
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

Creating subnets for a remote office
Join our peer-to-peer knowledge-sharing community and get answers to
questions like how to configure Active Directory for a remote office
location.

Last Posted Message
http://searchsecurity.techtarget.com/ITKnowledgeExchange/viewMessage/0,294934,sid14_gci1112545,00.html?track=NL-105&ad=525687

Visit ITKnowledge Exchange
http://searchsecurity.techtarget.com/ITKnowledgeExchange?track=IKTErtlp05-NL-105&ad=525687


SITE HIGHLIGHTS
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

Full session descriptions and conference-at-a-glance now available
for ISD Fall 2005
Visit the Information Security Decisions conference Web site to view
updated conference descriptions, full speaker lineup and the event
agenda. Also, learn how to qualify for free admission. Attendees
benefit from vendor-neutral conference sessions.
http://infosecurityconference.techtarget.com/?track=NL-105&ad=525687&Offer=SErtisd8

Receive 12 free issues of "Information Security" magazine
Activate your free one-year subscription today and each month you'll
receive this indispensable guide for security managers and executives
charged with protecting their organization's information assets and
reducing risk.
http://informationsecurity.techtarget.com/?track=NL-105&ad=525687&Offer=SErtm8


FEATURED WHITE PAPERS
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

Intuitive and Robust Patch Management
Published by: Symantec Corporation
http://searchSecurity.com/r/0,,45053,00.htm?track=NL-105&ad=525687

Application Security for Financial Institutions: Under GLBA, FFIEC,
and Other Law
Published by: Cenzic
http://searchSecurity.com/r/0,,45054,00.htm?track=NL-105&ad=525687

Buyer's Guide for Federated Identity
Published by: Oracle Corporation
http://searchSecurity.com/r/0,,45055,00.htm?track=NL-105&ad=525687

Best Practices in Enterprise Network Security
Published by: Vernier Networks
http://searchSecurity.com/r/0,,45081,00.htm?track=NL-105&ad=525687

The Role of Network Anomaly Detection Systems in the Enterprise
Published by: Lancope Inc.
http://searchSecurity.com/r/0,,45056,00.htm?track=NL-105&ad=525687

View All White Papers at:
http://searchsecurity.techtarget.com/whitepapers?track=NL-105&ad=525687


FEATURED WEBCASTS
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

IPS and the Next Wave of Network Security
When: Aug. 30, 2005, 2 p.m. EDT (18:00 GMT)
http://w.on24.com/r.htm?e=15511&s=1&k=B16C532CEE009A5F07AB3056179475EC&partnerref=RET
Speakers: Greg Young, Research Vice President, Gartner Group
Mike Barkett, Vice President, Systems Engineering, NFR Security
Sponsor: NFR Security, http://www.nfr.com/

Choosing the Right Single Sign-On Solution for Your Organization
When: Aug. 24, 2005, 2 p.m. EDT (18:00, GMT)
http://searchSecurity.com/r/0,,44886,00.htm?track=NL-105&ad=525687&RSA
Speakers: Abby Guha, Product Marketing Manager, RSA Security
Jonathan Penn, Principal Analyst with Forrester Research
Sponsor: RSA Security, http://www.rsasecurity.com/

View All Webcasts at:
http://searchsecurity.techtarget.com/webcasts?track=NL-105&ad=525687

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

CONTACT US:

Sales
For sales inquiries, please contact us at:
mailto:gderussy@techtarget.com

Editorial
For feedback about any of our articles or to send us your article
ideas, please contact us at:
mailto:cferraro@techtarget.com

---------------------- FREE E-NEWSLETTERS! ----------------------
SearchSecurity: Security Wire Daily
SearchSecurity: Network Security Tactics
SearchSecurity: Threat Monitor

Click here to subscribe:
http://searchSecurity.techtarget.com/tieredRegPage?track=NL-105&ad=525687&val=0&newsletters=796241&newsletters=796243&newsletters=1071165&email=pet.computter@gmail.com

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

ABOUT THIS E-NEWSLETTER

This e-newsletter is published by SearchSecurity.com, a targeted Web
site from TechTarget, the most targeted IT media and events company.
TechTarget offers magazines, Web sites, e-newsletters, Webcasts and
conferences for enterprise IT professionals.
Copyright 2005 TechTarget. All rights reserved.

_____________________________________________________________________

To unsubscribe from "Updates on new site content":

Go to unsubscribe: http://SearchSecurity.com/u?em=pet.computter%40gmail.com&uid=3058509&cid=525687&track=NL-105

Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.

Contact us:
SearchSecurity
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494