INFORMATION

Site Map - IT Security

One Campus, Many Devices

- Mobile device enrollment solutions make it easier to authenticate thousands of users onto a wireless network.

NIST Releases Cybersecurity Framework

- The National Institute of Standards and Technology takes comments from the public on guidelines for protecting networks.

RSA Executive Chairman Addresses NSA Allegations at Cyber Conference

- RSA Executive Chairman Art Coviello addressed attendees at the 2014 RSA Conference about a recent controversy involving the NSA

Network Intrusion Solutions

- When network administrators understand how intrusions occur, they can defend against future attacks.

Information Security Governance Simplified: From the Boardroom to the Keyboard

- In Information Security Governance Simplified, author Todd Fitzgerald provides an excellent over­view on how security managers can create an effective information security program without breaking the bank. He shows the reader how to create a governance program that includes all of the necessary managerial, technical, and operational controls.

DHS Has Limited Role in Healthcare.gov Arena, Agency Officials Testify

- The Committee on Homeland Security held a hearing on Thursday titled “Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov?” Department of Homeland Security (DHS) officials, as well as members of the private sector who work in information technology, were invited to discuss some of the security issues with Healthcare.gov.

Virtual Desktops and Security

- A virtual desktop environment can help companies securely manage “bring your own device” policies by controlling access to corporate information.

Cybercrime

- In a report titled Threats on the Horizon: The Rise of the Advanced Persistent Threat, Fortinet takes a look at the evolution of advanced persistent threats, how they typically operate, and the actors behind this cyberattack vector.

Case Study

- Learn about a software solution that helped one bank catch malware and save staff time previously spent on scanning PCs manually.

Countering the Persistent Threat

- A growing and nefarious cyberattack category, called advanced persistent threats, is a major concern for both governments and private enterprises that want to prevent their proprietary information from being stolen or damaged.

Virtually at Work

- A virtual desktop environment can help companies securely manage “bring your own device” policies by controlling access to corporate information.

Cyberattack Trends in Latin America

- Find out about malware trends and other cybersecurity issues facing Latin America.

NIST Releases Preliminary Cybersecurity Framework

- The National Institute of Standards and Technology (NIST) released a preliminary version of its cybersecurity framework on Wednesday.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.