Friday, February 27, 2009

Spring cleaning comes early; new videos

February 27, 2009 Published by


  > From the editor: Spring cleaning comes early; new videos


Spring cleaning comes early; new videos
[by Eric Parizo]

A big part of what we do as editors is to make all of's great information security content easy to find by keeping it organized.

And with so much ground to cover in the infosec realm, it's not as easy as you might think. That's why we're always thinking of new ways to organize our information so that our advice on multifactor authentication is as easy to find as news on the latest emerging threats.

To that end, I hope you'll find a few minutes to check out our newly reorganized topics section on Think of our topic pages like tags on a blog: just click on the subject of your choice to find all our best content, including news coverage, technical advice and exclusive videos.

The most important change we've made is the expansion of our section on enterprise data protection, which encompasses data classification, data governance, DLP technology and more. We know these are all areas that have become increasingly important to successful information security programs.

So while it may not be spring just yet, we invite your feedback on our spring cleaning efforts. Send us your feedback and suggestions to

More multimedia than ever

I also want to point out some of the fascinating new videos we have available on

For those of you who are still coming up to speed on the basics of the Payment Card Industry Data Security Standard (PCI DSS), look no further than a pair of new videos featuring SecurityCurve's Diana Kelley. The well-known PCI expert discusses the structure of the standard, including the various merchant levels, plus best practices and top challenges in becoming PCI compliant. (And if you're interested in greater depth on PCI DSS compliance, be sure to register for our free Mar. 25 virtual seminar on PCI compliance.)

We also have a new video series on virtualization as a disruptive technology. Top security researchers Chris Hoff, Rich Mogull and Dino Dai Zovi discuss the biggest virtualization security threats and benefits, organizational challenges and what's to come for virtualization security products.

Finally my colleague, Senior Technology Editor Neil Roiter, was at the recent Black Hat D.C. event and brought back some great footage, including researcher Vincenzo Iozzo demonstrating an attack against Mac OS X, and the always-controversial Joanna Rutkowska discussing how to attack Intel's Trusted Execution Technology.

You can see these and all our videos in the video library.

As always, we appreciate your loyal readership, and we hope you'll continue visiting!

Free virtual seminar: Understanding PCI DSS 1.2
Discover the changes between PCI 1.1 and 1.2, how to address compensating controls, application security requirements and the steps you need to take now to keep your organization compliant.

Security strategies during a recession (expert video)
WHEN:   On-Demand
SPEAKERS:   Marc Sokol V.P. Chief Security Officer, Guardium Life Insurance Company of America
  Bill Boni Corporate V.P., Information Security and Technology, Motorola
  Michael Mucha Chief Information Security Offer, Stanford Hospital
  Mark Weatherford Executive Officer, California Office of Information Security and Privacy Protection
  Martin Valloud Enterprise Platforms Team Lead, Roger Communications
SPONSOR:   Lumension
Data protection video series (expert video series)
WHEN:   On-Demand
SPEAKER:   Pete Lindstrom Research Director for Spire Security
Strategies for securing virtual machines (expert ebook)
WHEN:   18 Dec 2008
SPEAKERS:   Dennis Fisher Former Editor, Tech Target Security Media Group
  Michael Cobb Founder and Managing Director , Cobweb Applications Ltd.
  Thomas Ptacek Founder and Principal, Matasano Security
  Mike Rothman President and Principal Analyst, Security Incite
  Neil Roiter Senior Technology Editor, Information Security
SPONSOR:   Information Security magazine

For sales inquiries, please contact us at:

For feedback about any of our articles or to send us your article ideas, please contact us at:
Receive Security-related news, tech tips, and more delivered directly to your Inbox. Sign-up by selecting one or more topics and submit your e-mail address below.
SearchSecurity: Security Wire Daily
SearchSecurity: Current Threats
SearchSecurity: Network Security

Not a Member? We'll activate your membership with your subscription.

TechTarget Get Information Security magazine? Answer 12 quick questions and start a FREE subscription:

This e-newsletter is published by, part of the TechTarget network. TechTarget provides IT professionals with the resources they need to perform their jobs: Web sites, newsletters, forums, blogs, white papers, webcasts, events and more.

Copyright 2009 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.

If you no longer wish to receive Updates on new site content from go to unsubscribe:

Unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Please note, this will not affect any other subscriptions you have signed up for.

Contact Us:
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy: PRIV LINK

No comments:

Post a Comment