All My TechTarget Stuff to Date
Here’s a collection of links to all my articles to date for TechTarget on their SearchSecurity, Ask The Expert and SearchSMB web sites.
I’ve been at this for a little over a year and will add new articles going forward as they’re published. I wanted to post what I’ve done so far.
The articles on SearchSMB may require registration to TechTarget. Go ahead. It’s a great site with loads of fantastic information about not just SMBs but every aspect of enterprise IT, large and small, and up-to-the-minute hot news.
My first podcast from SearchSecurity came out recently. It was a lot of fun to make. I just recorded a second one, this time for SearchCIO, on Friday but have no date when it’ll be up on their site. I’ll post it here, when it’s ready. I have a piece in their magazine, CIO Decisions, coming out in November.
And now for the articles:
SearchSecurity
I’ve been at this for a little over a year and will add new articles going forward as they’re published. I wanted to post what I’ve done so far.
The articles on SearchSMB may require registration to TechTarget. Go ahead. It’s a great site with loads of fantastic information about not just SMBs but every aspect of enterprise IT, large and small, and up-to-the-minute hot news.
My first podcast from SearchSecurity came out recently. It was a lot of fun to make. I just recorded a second one, this time for SearchCIO, on Friday but have no date when it’ll be up on their site. I’ll post it here, when it’s ready. I have a piece in their magazine, CIO Decisions, coming out in November.
And now for the articles:
SearchSecurity
- 13 Sep 05: Security awareness training: How to educate employees about spyware
- 13 Sep 05: End user's spyware prevention checklist
- 26 Oct 05: How to secure session tokens
- 31 Oct 05: Block and re-route denial of service attacks
- 28 Dec 05: Tips for securing iPods in the enterprise
- 10 Jan 06: Cheat sheet: Access management solutions and their pros and cons
- 28 Feb 06: Two-factor authentication and compliance: What it is and isn’t
- 06 Apr 06: Biometrics: Best practices, future trends
- 11 Apr 06: Pen testing your VPN
- 07 Jun 06: Blocking web anonymizers in the enterprise
- 21 Jul 06: Email filtering tools and techniques
- 07 Aug 06: Telecommuting security: Protecting sensitive data inside and out
- 18 Sep 06: One-time password tokens: Best practices for two-factor authentication
- 08 Mar 06: Setting up identity and access management for SMBs (Part 1)
- 16 Mar 06: Implementing ID and access management (Part 2)
- 04 May 06: Incident response made easy (and cheap)
- 11 May 06: Firewall and IDS architecture setup for SMBs
- 22 Jun 06: A recipe for secure IM success
- 13 Jul 06: Security for mobile devices: Simple steps for SMBs
- 03 Aug 06: Linux security for SMBs – Check IT list
- 07 Sep 06: Secure storage for SMBs – easy and cheap
0 Comments:
Post a Comment
<< Home