INFORMATION

Site Map - Web-based Threats

Behind the Numbers

- Chart: Information that IT deems too risky for cloud computing.

President Needs Emergency Cybersecurity Powers, Sen. Collins Says

- The White House needs to have the emergency authority to compel the private sector to protect U.S. critical infrastructure if it came under a sustained cyberattack, according to Sen. Susan Collins (R-ME) Tuesday.

Google Cyberattack Used Run-of-the-Mill Attack Method

- New details about the cyberthefts at Google late last year seem to prove one thing: even the best of us can fall for routine hacker tactics.

Data Breaches Can Lead to Beneficial Outcomes

- Firms grow wiser after a data breach, a new Ponemon Institute study finds. (From the April 2010 Issue)

Private Sector Best Defense Against Cyberattacks, White House Cybersecurity Coordinator Says

- Companies are the best defense against cyberattacks, said the White House's point man on cybersecurity yesterday, while he continued to downplay the probability of a cyber-catastrophe.

Cybersecurity

- International cyberattacks have skyrocketed, not only in number but also in severity, while security efforts have suffered cuts due to the recession, according to an unprecedented survey by McAfee and the Center for Strategic and International Studies.

Behind the Numbers

- Pharmaceutical fraud dominated spam in the second half of 2009.

Cybersecurity

- Argonne National Laboratory’s Federated Model for Cyber Security joins different organizations together to share cyberthreat information. Find out how to put together a federated model at Argonne’s Web site.

Cyber-Neighborhood Watch

- The U.S. Department of Energy's Argonne National Laboratory has created a way for entities to share information on cyberattacks in real time.

Hacking Wall Street

- Hacking Wall Street  is an interesting book from an author with no credentials.

Web Security Testing Cookbook

- A bit outdated, this Web security text can nevertheless help developers and quality assurance testers apply effective security design strategies.

President Obama Picks Cybersecurity Czar

- Seven months after calling cybersecurity critical to "public safety and national security," President Barack Obama today will name his pick for the nation's first cybersecurity czar.

Fraud and Small Business

- As criminals target the online transactions of small and medium-sized businesses, companies are exploring security options such as standalone operating systems.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.