INFORMATION

Site Map - Web-based Threats

Infrastructure Protection

- Industries such as energy and utilities, which make up America’s critical infrastructure, may be weaker than other industries when it comes to managing risk and guarding against cyberattacks, according to this report.

Social Networking Security

- Increasingly, employees expect to remain connected to social networking sites while at work. But these sites represent a growing threat in terms of malware, for instance.

Social Networking Security

- Increasingly, employees expect to remain connected to social networking sites while at work. But these sites represent a growing threat.

Morning Security Brief: Vetting Utility Workers, 911 Tapes, Verizon Strike, and More

- A U.S. lawmaker introduces legislation for doing background checks on utility workers. North Carolina will begin to alter 911 tapes to protect victims. Tel Aviv University has developed a hand-held date rape drug detector. And more.

Former DHS Secretary Praises New Government Cyber Identities Plan

- Former Department of Homeland Security Secretary Michael Chertoff voices support for the White House's plan to secure identities in cyberspace.

Security's Nebulous Side

- A look at two companies that have adopted a cloud-based security solution for surveillance and access control.

Behind the Numbers

- Confidential data loss and exposure top the concerns over cloud computing.

Top Government Lab Hacked

- In further proof that no one is safe from a determined cyberattacker, a top United States federal lab was the victim of a cyberattack earlier this month.

Wild West 2.0: How to Protect and Restore Your Online Reputation on the Untamed Social Frontier

- Michael Fertik and David Thompson argue the Internet needs a modern-day Wyatt Earp to protect the innocent from the falsehoods and innuendoes that ruin businesses and lives.

Securing the Smart Grid

- Companies should be aware that smart grid technology, while innovative, could also be vulnerable to cybersecurity threats.

Behind the Numbers

- Auction fraud has drastically fallen over six years while identity theft has slowly climbed, according to cybercrime complaints. -------------------------------------------------------------------------------

Attackers Exploit Trust in PDFs

- Hackers have grown increasingly attracted to using PDF attachments to carry out targeted cyberattacks, cautions a new cybersecurity report.

Cyberdefense

- Small businesses are not immune to cybercrime. Visa and the National Cyber Security Alliance offer resources to help small businesses secure their online activities. More guidance is available from the Payment Card Industry Security Standards Council’s small business site.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.