INFORMATION

Site Map - Cybersecurity

Behind the Numbers

- Top Barriers to Enterprise Risk Management

Protecting Against Persistent Threats

- Sophisticated and sustained cyberattacks that are perpetrated to steal trade secrets, rather than financial assets, frequently go undetected by traditional signature-based antimalware solutions.

Communicating in a Crisis

- Social media outlets can provide companies with a unique way to get their message out during a crisis.

How One University Enhanced Cybersecurity

- West Virginia University is strengthening its Web application security with a solution from IBM.

Continuity Program Buy-in

- Those charged with continuity planning can get support from senior management by developing metrics and demonstrating value to the bottom line.

CHART: Mobile Device Security

- How organizations are securing mobile devices.

Study Highlights Infrastructure Risks

- A biennial report that looks at how well various industries manage risk and guard against cyberattacks has found that critical infrastructure, including the energy and utilities sectors, is among the lowest ranked of the group.

Screen Scraping Security

- Companies that use scanning tools to search for data must be careful to avoid violating privacy laws.

CHART: Cyber-Risk Control Practices of Top Management

- How boards & senior executives are managing cyber risks.

Encryption Critical in Healthcare

- Encryption technology, as well as security protocols and safeguards, are crucial to protecting patient data and complying with regulatory standards.

Developing a Cybersecurity Staff

- The federal government can improve its cybersecurity capabilities through more targeted hiring and training of a cybersecurity work force, but that’s easier said than done.

Consolidating Authorization

- Helping companies consolidate the network access and authentication process.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.