All My TechTarget Stuff to Date
      Here’s a collection of links to all my articles to date for TechTarget on their SearchSecurity, Ask The Expert and SearchSMB web sites.
I’ve been at this for a little over a year and will add new articles going forward as they’re published. I wanted to post what I’ve done so far.
The articles on SearchSMB may require registration to TechTarget. Go ahead. It’s a great site with loads of fantastic information about not just SMBs but every aspect of enterprise IT, large and small, and up-to-the-minute hot news.
My first podcast from SearchSecurity came out recently. It was a lot of fun to make. I just recorded a second one, this time for SearchCIO, on Friday but have no date when it’ll be up on their site. I’ll post it here, when it’s ready. I have a piece in their magazine, CIO Decisions, coming out in November.
And now for the articles:
SearchSecurity
    I’ve been at this for a little over a year and will add new articles going forward as they’re published. I wanted to post what I’ve done so far.
The articles on SearchSMB may require registration to TechTarget. Go ahead. It’s a great site with loads of fantastic information about not just SMBs but every aspect of enterprise IT, large and small, and up-to-the-minute hot news.
My first podcast from SearchSecurity came out recently. It was a lot of fun to make. I just recorded a second one, this time for SearchCIO, on Friday but have no date when it’ll be up on their site. I’ll post it here, when it’s ready. I have a piece in their magazine, CIO Decisions, coming out in November.
And now for the articles:
SearchSecurity
- 13 Sep 05: Security awareness training: How to educate employees about spyware
 - 13 Sep 05: End user's spyware prevention checklist
 - 26 Oct 05: How to secure session tokens
 - 31 Oct 05: Block and re-route denial of service attacks
 - 28 Dec 05: Tips for securing iPods in the enterprise
 - 10 Jan 06: Cheat sheet: Access management solutions and their pros and cons
 - 28 Feb 06: Two-factor authentication and compliance: What it is and isn’t
 - 06 Apr 06: Biometrics: Best practices, future trends
 - 11 Apr 06: Pen testing your VPN
 - 07 Jun 06: Blocking web anonymizers in the enterprise
 - 21 Jul 06: Email filtering tools and techniques
 - 07 Aug 06: Telecommuting security: Protecting sensitive data inside and out
 - 18 Sep 06: One-time password tokens: Best practices for two-factor authentication
 
- 08 Mar 06: Setting up identity and access management for SMBs (Part 1)
 - 16 Mar 06: Implementing ID and access management (Part 2)
 - 04 May 06: Incident response made easy (and cheap)
 - 11 May 06: Firewall and IDS architecture setup for SMBs
 - 22 Jun 06: A recipe for secure IM success
 - 13 Jul 06: Security for mobile devices: Simple steps for SMBs
 - 03 Aug 06: Linux security for SMBs – Check IT list
 - 07 Sep 06: Secure storage for SMBs – easy and cheap
 
0 Comments:
Post a Comment
<< Home