As an IT professional a big part of your job is to keep up with
attacks and implement technologies that protect your company’s network.
Unfortunately, this job has become more difficult over the last few years as
the complexity of the network’s infrastructure has increased dramatically. A
brief look at the CERT
Coordination Center’s vulnerability statistics confirms the
challenge you currently face.
At TechRepublic we devote a great deal of our content to
helping you with this security battle. Recently, we began producing a series of
free audio Webcasts available to members that feature the thoughts and
suggestions of real IT security professionals on specific security topics. Each
audio Webcast is no more that 20 minutes in length, so the time commitment is
minimal. Check out each link below and discover a better way to keep up to date
on the security issues that matter to you:
- Prevent network vulnerabilities –
The total number of new vulnerabilities reported this year has
skyrocketed. Organizations simply lack the time and wherewithal to
determine which ones are important to their business operations. However,
with the right tools, services, and internal cooperation in place you can
focus efforts where they are needed most to mitigate your exposure. This
audio Webcast will examine some common characteristics of today’s
vulnerabilities and provide steps you can implement now to protect your
network. - Optimize your security plan – The time between
notification and deployment of vulnerabilities has dwindled from months to
hours. For busy IT Professionals this trend means finding faster
alternatives for detection. One solution is using a Web services vendor.
This audio Webcast will look at how Web services vendors can speed up the
vulnerability detection process to narrow the window of time between
discovery of a security risk and its removal. - Top questions to ask a security firm – In order to
combat today’s numerous vulnerability threats, many organizations are turning
to outsourced security firms that specialize in preempting these attacks
before they reach critical mass. However, there are important questions
that need to be asked before you turn your security function over to an
outsider. To help with one of these questions, this audio Webcast will
focus on what you should ask a security firm about its vulnerability
database.