Monday, August 29, 2005

This Week: Your one-stop shop for learning tools

This Week

A newsletter from TechTarget
August 29, 2005

> From the Editor: Check out our Security Learning Guide Library
> Exclusives: Phishing: The business risks and
strategies for mitigating them
> ITKnowledge Exchange: Creating subnets for a remote office
> Site Highlights: Full session descriptions and
conference-at-a-glance now available for ISD Fall 2005
> White Papers: Intuitive and Robust Patch Management
> Webcasts: IPS and the Next Wave of Network Security


Check out our Security Learning Guide Library
[by Jenny Wiseman]

Did you know has a repository of security Learning
Guides? These educational tools are designed to be your one-stop shop
for learning about specific security topics. Each guide includes the
latest news articles, tips, expert advice, chapter downloads,
webcasts and more, to arm you with the tactics you need to keep data
and systems secure.'s Security Learning Guides:,295582,sid14_gci1119344,00.html?track=NL-105&ad=525687

Our newest guide targets SAP security and is designed to help SAP
professionals bulletproof their systems. It covers everything from
authentication and RFID to compliance and auditing.
SAP Security Learning Guide:,295582,sid14_gci1118478,00.html?track=NL-105&ad=525687

You can find all of our guides in our Security Learning Guide
Library. Some of the hot topics we cover include Firewalls, VoIP,
Thwarting Hacker Techniques and Snort, to name a few. Check out all
these and more in our library. If there's a guide you would like to
see on, please send an e-mail to and let us know.

Firewall Learning Guide:,295582,sid14_gci1093527,00.html?track=NL-105&ad=525687
VoIP Learning Guide:,295582,sid14_gci1094388,00.html?track=NL-105&ad=525687
Thwarting Hacker Techniques Learning Guide:,295582,sid14_gci1099349,00.html?track=NL-105&ad=525687
Snort Technical Guide:,295582,sid14_gci1083823,00.html?track=NL-105&ad=525687


Phishing: The business risks and strategies for mitigating them
By now, most end users realize that phishing is a form of identity
theft. However, why should IT and security managers worry about this
significant threat? This tip explains why phishing is a business
issue and highlights what some organizations are doing to protect
themselves and their customers.,289483,sid14_gci1118183,00.html?track=NL-105&ad=525687

Choosing the right firewall topology: Bastion host, screened subnet
or dual firewalls
Deciding where to place your network's firewall is a common problem
organizations face when developing a perimeter protection strategy.
This tip takes a closer look at the three basic firewall options and
offers suggestions to help determine where your firewall will be most

Avoid the hazards of unvalidated Web application input
An attacker can easily obtain sensitive information or attack a Web
site if user-submitted information isn't properly validated. So
what's a programmer to do? This tip examines how unvalidated input
works and what programmers can do to properly secure Web


Creating subnets for a remote office
Join our peer-to-peer knowledge-sharing community and get answers to
questions like how to configure Active Directory for a remote office

Last Posted Message,294934,sid14_gci1112545,00.html?track=NL-105&ad=525687

Visit ITKnowledge Exchange


Full session descriptions and conference-at-a-glance now available
for ISD Fall 2005
Visit the Information Security Decisions conference Web site to view
updated conference descriptions, full speaker lineup and the event
agenda. Also, learn how to qualify for free admission. Attendees
benefit from vendor-neutral conference sessions.

Receive 12 free issues of "Information Security" magazine
Activate your free one-year subscription today and each month you'll
receive this indispensable guide for security managers and executives
charged with protecting their organization's information assets and
reducing risk.


Intuitive and Robust Patch Management
Published by: Symantec Corporation,,45053,00.htm?track=NL-105&ad=525687

Application Security for Financial Institutions: Under GLBA, FFIEC,
and Other Law
Published by: Cenzic,,45054,00.htm?track=NL-105&ad=525687

Buyer's Guide for Federated Identity
Published by: Oracle Corporation,,45055,00.htm?track=NL-105&ad=525687

Best Practices in Enterprise Network Security
Published by: Vernier Networks,,45081,00.htm?track=NL-105&ad=525687

The Role of Network Anomaly Detection Systems in the Enterprise
Published by: Lancope Inc.,,45056,00.htm?track=NL-105&ad=525687

View All White Papers at:


IPS and the Next Wave of Network Security
When: Aug. 30, 2005, 2 p.m. EDT (18:00 GMT)
Speakers: Greg Young, Research Vice President, Gartner Group
Mike Barkett, Vice President, Systems Engineering, NFR Security
Sponsor: NFR Security,

Choosing the Right Single Sign-On Solution for Your Organization
When: Aug. 24, 2005, 2 p.m. EDT (18:00, GMT),,44886,00.htm?track=NL-105&ad=525687&RSA
Speakers: Abby Guha, Product Marketing Manager, RSA Security
Jonathan Penn, Principal Analyst with Forrester Research
Sponsor: RSA Security,

View All Webcasts at:



For sales inquiries, please contact us at:

For feedback about any of our articles or to send us your article
ideas, please contact us at:

---------------------- FREE E-NEWSLETTERS! ----------------------
SearchSecurity: Security Wire Daily
SearchSecurity: Network Security Tactics
SearchSecurity: Threat Monitor

Click here to subscribe:



This e-newsletter is published by, a targeted Web
site from TechTarget, the most targeted IT media and events company.
TechTarget offers magazines, Web sites, e-newsletters, Webcasts and
conferences for enterprise IT professionals.
Copyright 2005 TechTarget. All rights reserved.


To unsubscribe from "Updates on new site content":

Go to unsubscribe:

Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully

Contact us:
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494