Site Map - Cybersecurity

Presidio Combats Fraud with IronKey

- One bank’s effort to improve transaction security.

Protecting Children’s Privacy Online

- A proposed rule would limit the ability of companies to track and collect children’s online information.

CHART: Behind The Numbers

- Security tools lag behind security policies.

Creating a Digital Evidence Policy

- Now that most court cases involve digital evidence analysis, companies should develop a policy on retaining such documents.

Behind the Numbers

- Top Barriers to Enterprise Risk Management

Protecting Against Persistent Threats

- Sophisticated and sustained cyberattacks that are perpetrated to steal trade secrets, rather than financial assets, frequently go undetected by traditional signature-based antimalware solutions.

Communicating in a Crisis

- Social media outlets can provide companies with a unique way to get their message out during a crisis.

How One University Enhanced Cybersecurity

- West Virginia University is strengthening its Web application security with a solution from IBM.

Continuity Program Buy-in

- Those charged with continuity planning can get support from senior management by developing metrics and demonstrating value to the bottom line.

CHART: Mobile Device Security

- How organizations are securing mobile devices.

Study Highlights Infrastructure Risks

- A biennial report that looks at how well various industries manage risk and guard against cyberattacks has found that critical infrastructure, including the energy and utilities sectors, is among the lowest ranked of the group.

Screen Scraping Security

- Companies that use scanning tools to search for data must be careful to avoid violating privacy laws.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.