INFORMATION

Site Map - Web-based Threats

Top Government Lab Hacked

- In further proof that no one is safe from a determined cyberattacker, a top United States federal lab was the victim of a cyberattack earlier this month.

Wild West 2.0: How to Protect and Restore Your Online Reputation on the Untamed Social Frontier

- Michael Fertik and David Thompson argue the Internet needs a modern-day Wyatt Earp to protect the innocent from the falsehoods and innuendoes that ruin businesses and lives.

Securing the Smart Grid

- Companies should be aware that smart grid technology, while innovative, could also be vulnerable to cybersecurity threats.

Behind the Numbers

- Auction fraud has drastically fallen over six years while identity theft has slowly climbed, according to cybercrime complaints. -------------------------------------------------------------------------------

Attackers Exploit Trust in PDFs

- Hackers have grown increasingly attracted to using PDF attachments to carry out targeted cyberattacks, cautions a new cybersecurity report.

Cyberdefense

- Small businesses are not immune to cybercrime. Visa and the National Cyber Security Alliance offer resources to help small businesses secure their online activities. More guidance is available from the Payment Card Industry Security Standards Council’s small business site.

Patients Uneasy About Security of Electronic Health Records

- A new survey finds patients wary of the move to electronic health records and the ability of their healthcare providers to secure them.

Large-scale Cyberattack Knocks Parts of Canadian Government Offline

- A large cyberattack traced back to servers in China and first detected in early January has led the Canadian government to shut down Internet access at two government departments.

Cloud Computing

- A new Forrester Research report describes how to take advantage of cloud-based services and also maintain compliance and security.

Cloud Security and Compliance Basics

- Understanding the types of services and security cloud computing providers offer is key to meeting compliance goals.

Information Warfare

- Information Warfare is a poorly written text that has no practical value for guiding information operations today.

Squelching Attacks with Splunk

- Splunk can help IT departments easily analyze patterns of potential threat activity.

Behind the Numbers

- Primary reasons companies aren't adopting pay-per-use hosting of virtual servers.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.