INFORMATION

Site Map - IT Security

Morning Security Brief: Cybersecurity Improvements, CCTV vulnerability, Human Trafficking and ID Theft Raids

- Presidents Obama and Putin pledge to work together on cybersecurity. A researcher says that many CCTV cameras can be remotely attacked via the public Internet. More than a dozen convenience stores were raided as part of a massive human trafficking and identity theft investigation.

Data Breaches

- According to a recent survey of IT professionals conducted by the Ponemon Institute, insider fraud is on the rise, with data breaches being one of the most common threats. However, fewer than half of the companies surveyed say they are prepared to deal with the challenge. Read about those and other findings online.

Cisco Executive Discusses Evolving Perspectives on Cybersecurity

- Companies need to shift their focus in cybersecurity and vendors need to cooperate more, according to Bret Hartman, chief technology officer for Cisco’s Security Technology Group.

Behind the Numbers

- Top 5 Data-Protection Practices in Healthcare

Don’t Overdo Data Retention

- Experts urge companies to revisit their data retention policies to ensure that they are culling information archives effectively.

Monitoring Social Media Use

- More businesses are using social media to promote their brands, and that raises issues about when and how they should monitor what employees do with it.

Cybersecurity Framework Draft Efforts Underway

- Find out what’s happening with the cybersecurity framework.

New Trends in Cyber Threats

- For a few hundred dollars in start-up money and a few hundred more a month, anyone can buy the tools and services they need to build and run a malicious botnet. That's just one of the reasons the cyberlandscape is so hard to police.

Data Security

- According to a new study from the International Information Systems Security Certification Consortium, or (ISC)2, a shortage of security experts with strong leadership and communications skills poses a direct challenge to organizations around the world. The study includes feedback from more than 12,000 IT security professionals from across the globe.

Behind the Numbers

-

Morning Security Brief: Discovering the Motives of Hackers, Arming Teachers, and Defending Whistleblowers

- Experts ponder the motives of hackers, a Utah bill requires disclosure if teachers are armed, and the U.S. government orders a company to pay whistleblowers.

RSA Conference Speaker Lauds IT Security Advancements

- Security industry professionals have made tremendous headway in developing and improving secure technologies over the past few decades. Creating more sophisticated methods of authentication, combating malware and spam, and battling the threat of cybercrime head-on are just a few of the advancements in the industry lauded by Scott Charney, corporate vice president of trustworthy computing at Microsoft. He spoke on Tuesday at the RSA Conference in San Francisco, California.

Security Strategy: From Requirements to Reality

- Though this book is slightly more on the IT side, the authors of Security Strategy bridge this divide by discussing both types of issues as they relate to high-level security.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.