Site Map - Cybercrime

DHS Official Discusses How Legal and Privacy Concerns Are Part of Cyber Protection Efforts

- Protecting U.S. federal civilian government networks and the U.S. critical infrastructure against cyberthreats requires an aggressive and proactive approach, but privacy and legal concerns must be part of the equation, says the DHS official in charge of one program involved in the effort.

Cybersecurity: Public Sector Threats and Responses

- Author Kim Andreasson provides an over­view of how government agencies and other public-sector groups can use the Internet without introducing unnecessary risks to their constituents.

America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare

- Author Joel Brenner discusses lessons learned from his work in government intelligence positions, and asserts that government and corporations reside in a “glass house” in terms of transparency where secrecy and security are illusions.

Cyberattacks Grow More Complex

- While cyberattacks on government targets make the headlines, cyberthieves continue their relentless assault on businesses.

Assessing U.S. Response to Cyberthreat

- U.S. government agencies must work together and partner with the private sector more closely to prevent cyberattacks by foreign agents.


- The White House is setting up a new interagency working group to counter online radicalization. The activities of the new group are designed to raise public awareness and give tips for staying safe online.

Morning Security Brief: China's Hackers Tracked, Turkey Raids Group that Attacked U.S. Embassy, and More

- Cyberattacks on U.S. interests traced to Chinese building associated with its army; Turkey goes after members of terrorist group responsible for attack on U.S. Embassy; civilians killed in Afghanistan declined. And more.

Morning Security Brief: Concerns about European Cybersecurity Strategy, Estonian Cybersecurity, Border Security, More

- Concerns are being raised about the European Commission's new cybersecurity strategy. Estonia is the poster child for cybersecurity. Homeland Security Secretary Napolitano says insistence that the border be secured before immigration reform is a flawed argument. A new GAO report says that the FCC was lax in security control for the Enhanced Secured Network Project.

Morning Security Brief: Unattended Weapon, ‘Smart’ TASER, 787s Grounded, and More

- Security guard leaves weapon in bathroom at middle school. The newest model of TASERS contains black box-type features. The U.S. grounds all 787s. And more.

Protecting Against Cyberthreats

- Threats to the infrastructure are both real and growing. These insiders discuss the nature of the threat and what can be done to mitigate it.

Computer Crime

- An employee who downloaded confidential documents before going to a competitor did not violate the Computer Fraud and Abuse Act. The law, ruled the court, applies to those who access data without authorization.

Cyber Warfare: Techniques, Tactics, and Tools for Security Practitioners

- Apparently aimed at a military audience, this book offers concepts and examples largely from the U.S. military.

Protecting Against Cyberthreats

- Threats to the infrastructure are both real and growing. These insiders discuss the nature of the threat and what can be done to mitigate it.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.