INFORMATION

Site Map - IT Security

Morning Security Brief: Federal Worker Database Breached, ATF Review, Cybersecurity and More

- Chinese hackers accessed a database of federal workers' information in March, a GAO report on changes in the ATF, cybersecurity concerns for industrial control systems, and more.

Morning Security Brief: Federal Worker Database Breached, ATF Review, Cybersecurity, and More

- Chinese hackers accessed a database of federal workers' information in March, a GAO report on changes in the ATF, cybersecurity concerns for industrial control systems, and more.

Windows XP Goes Dark

- Microsoft abandons patches for Windows XP, and a healthcare group protects against dangerous e-mail.

Cyber Experts Talk Trends

- Cybersecurity experts point out that personal information is a profitable commodity for criminals, and it professionals need to protect their networks throughout the entire supply chain.

One Campus, Many Devices

- Mobile device enrollment solutions make it easier to authenticate thousands of users onto a wireless network.

NIST Releases Cybersecurity Framework

- The National Institute of Standards and Technology takes comments from the public on guidelines for protecting networks.

RSA Executive Chairman Addresses NSA Allegations at Cyber Conference

- RSA Executive Chairman Art Coviello addressed attendees at the 2014 RSA Conference about a recent controversy involving the NSA

Network Intrusion Solutions

- When network administrators understand how intrusions occur, they can defend against future attacks.

Information Security Governance Simplified: From the Boardroom to the Keyboard

- In Information Security Governance Simplified, author Todd Fitzgerald provides an excellent over­view on how security managers can create an effective information security program without breaking the bank. He shows the reader how to create a governance program that includes all of the necessary managerial, technical, and operational controls.

DHS Has Limited Role in Healthcare.gov Arena, Agency Officials Testify

- The Committee on Homeland Security held a hearing on Thursday titled “Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov?” Department of Homeland Security (DHS) officials, as well as members of the private sector who work in information technology, were invited to discuss some of the security issues with Healthcare.gov.

Virtual Desktops and Security

- A virtual desktop environment can help companies securely manage “bring your own device” policies by controlling access to corporate information.

Cybercrime

- In a report titled Threats on the Horizon: The Rise of the Advanced Persistent Threat, Fortinet takes a look at the evolution of advanced persistent threats, how they typically operate, and the actors behind this cyberattack vector.

Case Study

- Learn about a software solution that helped one bank catch malware and save staff time previously spent on scanning PCs manually.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.