INFORMATION

Site Map - IT Security

Software Security: Building Security In

- McGraw goes into detail not only about writing secure code but also about key related areas, which he terms “the seven touchpoints of software security.”

Cybersecurity Progress

- The Homeland Security Department is still struggling to fulfill its cybersecurity responsibilities, according to this report from the Government Accountability Office.

A Site to See

- A television show for geeks.

A Healthy Way to Protect Patient Data

- A healthcare organization found that it needed a way to control the use of removable media to ensure that patient data remains protected.

Keys to Encryption

- Encrypting data is no longer an expensive, time-consuming headache. Here’s an overview of some of the different types of encryption products available.

Numbers

- 100 The number, in millions, of records containing personal information reported compromised between February 2005 and December 2006, according to the Privacy Rights Clearinghouse.

Barriers to Better IT Security

- What prevents IT professionals from setting up the best possible security programs?

Cybersecurity

- Get up to code with Web application security standards and learn how to plug up your cybersecurity holes before a hacker attacks here, here, and here.

Malware's Evolving Threat

- An overview of malware assailing your computer.

IT Security

- INS conducted a survey about what prevents IT professionals from setting up the best possible security programs. Get the results.

Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition

- The book covers important ISA issues such as the nature of the organization, policies and standards, baselines and risk assessment, awareness and training, compliance, and more.

Banks Prove Themselves to Customers - and Vice Versa

- Thwarting phishing attacks on bank Web sites.

New In PlainText

- If your company has a Web site, hackers will attack it.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.