INFORMATION

Site Map - Web-based Threats

Cloud Computing

- A new Forrester Research report describes how to take advantage of cloud-based services and also maintain compliance and security.

Cloud Security and Compliance Basics

- Understanding the types of services and security cloud computing providers offer is key to meeting compliance goals.

Information Warfare

- Information Warfare is a poorly written text that has no practical value for guiding information operations today.

Squelching Attacks with Splunk

- Splunk can help IT departments easily analyze patterns of potential threat activity.

Behind the Numbers

- Primary reasons companies aren't adopting pay-per-use hosting of virtual servers.

Google Searches Warn Against Hacked Web Sites

- In an effort to help its customers avoid compromised Web sites, Google has added a new tool to its search engine that notifies users when it has detected suspicious activity on a Web site.

GAO Finds Hackers Could Exploit Wireless Vulnerabilities

- Congress's watchdog reports finds that many federal agencies inconsistently apply security guidelines and best practices, leaving government networks and information vulnerable to attack.

Mobile Malware Will Grow in 2011, Predicts IT Security Firm

- Cybercriminals will feast on the insatiable demand for smartphones and tablets, like Apple's iPad, to infest as many devices with malware as possible in 2011, security firm M86 predicts.

Numbers

- 54 The percentage of people who feel guilty or hold themselves responsible for falling victim to cybercrime, according to Symantec’s Cybercrime Report: The Human Impact. Slightly more respondents, 58 percent, reported feeling angry; 65 percent of the 7,000 global computer users polled said they had been victimized by some form of cybercrime.

Behind the Numbers

- Barriers that U.S. states face in achieving IT security.

Cybercriminals Try to Spear Retail Sector with Targeted Attacks

- Over the last month the retail sector has become the targets of spear phishermen, a particularly devious and hard to detect targeted attack, according to the cybersecurity firm MessageLabs Intelligence.

Banks Beef Up End-Users' Security

- By offerring free browser security software to customers, one bank improved safety across the board.

DHS Cyber Team Helps Industry Secure Critical Infrastructure Networks

- The Department of Homeland Security's ICS-Cyber Emergency Response Team is helping owners and operators secure their industrial control systems.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.