INFORMATION

Site Map - Research & Studies

Morning Security Brief: Texas Bolsters Border Security, Cybersecurity Workforce Shortage, Railroad Security, and More

- Texas will increase its border security funding to deal with a surge of immigrants from Central America. The RAND Corporation has released a study examining the shortage of cybersecurity professionals in the United States. Senators have released a bill requesting funding for a Short Line Rail Safety Institute.

Cybersecurity

- The 2014 Security Threat Report from Sophos explores the latest trends in cybersecurity and the most malicious threats to enterprises, government, and individuals on a global scale. The report looks at risks like targeted threats to financial accounts, Android malware, and the end of support updates for Microsoft’s Windows XP operating system.

A Plan to Stem Extremism

- Since 9-11, there have been more than 200 U.S.-based al Qaeda violent extremists arrested over a combination of 60-plus attempted and successful plots. In response, the Muslim Public Affairs Council has released the Safe Spaces Initiative: Tools for Developing Healthy Communities to help community leaders prevent extremist ideas from turning into dangerous actions.

Trade Secret Theft

- Trade secret theft costs industry billions of dollars each year and no company is immune to trade secret misappropriation. In a recent white paper, the Center for Responsible Enterprise and Trade details how widespread trade secret theft has become and how companies can mitigate the risk of trade secret misappropriation.

Espionage

- The NATO report Pandemonium: Nation States, National Security, and the Internet looks at nation-state hacking and the power of espionage in modern culture.

Global Cyber Risk

- Under Cyber Attack: EY’s Global Information Security Survey 2013, a report from Ernst and Young, describes the cyber risks facing today’s business world and offers some strategies for addressing them.

NSA Surveillance

- President Barack Obama asked a group of experts to provide recommendations on modifying the National Security Agency’s bulk data collection program. Read the report here.

Healthcare Privacy

- Patient privacy remains at risk despite federal laws to protect it. Learn more in the Fourth Annual Benchmark Study on Patient Privacy and Data Security, a study by the Ponemon Institute that was sponsored by ID Experts.

EU Corruption

- Corruption is costly. In fact, it is costing the European Union about €120 billion ($165 billion) per year, according to a recent report from the European Commission. It assesses corruption in all of the EU’s 28 member countries, analyzing industry sectors, the nature and level of corruption, and the effectiveness of measures taken to fight it, which vary from country to country.

Online Pharmacies

- One estimate suggests that there were over 36,000 rogue Internet pharmacies in operation as of February 2014, and these rogue sites violate a variety of federal laws, according to a government report. The report also discusses the substantial challenges investigating and prosecuting those involved with rogue Internet pharmacies, which are often complex, global operations.

Infrastructure Protection

- To address additional security concerns facing critical infrastructure, the Department of Homeland Security has issued an updated version of the National Infrastructure Protection Plan (NIPP). The new NIPP outlines how the government and private sector in the critical infrastructure community can work together to manage risks in the 16 critical infrastructure sectors.

Airport Screening

- A Government Accountability Office report recommends that the Transportation Security Administration no longer fund its behavior detection programs because they are generally ineffective. Its meta-analysis of hundreds of studies found that the ability of human observers to accurately identify deceptive behavior based on behavioral cues is the same as or slightly better than chance.

Data Protection

- The IT Risk/Reward Barometer, conducted by the nonprofit global association ISACA, examines the gaps between what people believe and what they do when it comes to the Internet and sharing information online. For example, people tend to fear that their information is at risk, but most continue to be careless with their passwords.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.