INFORMATION

Site Map - Cybersecurity

Worth a Look: iSpy

- Associate Editor John Wagley reviews an inexpensive surveillance application with a breadth of features and controls.

Social Networking Security

- Increasingly, employees expect to remain connected to social networking sites while at work. But these sites represent a growing threat.

Dial “O” for an Open Door

- While a new technology that could turn smartphones into access control devices looks promising, a recent pilot program reveals complications.

Behind the Numbers

- The ramifications of cyberattacks.  

CHART: How Companies Protect Sensitive Information

- Steps companies are taking to protect data.  

Worth a Look: iHound

- An inexpensive application for tracking Apple and Android devices.

Can ISPs Help Beat Botnets?

- To fight hackers, companies are informing customers of threats, creating public-private partnerships, and devising security standards.

Worth a Look: CamCam

- A new application called CamCam, offers a good balance of quality, ease of use, and cost for someone who wants a limited home surveillance option.

Firms Flock to Managed Services

- Before organizations contract with managed security services providers, they should clarify their needs and expectations.

Ranking of Cloud Security Measures

-  Survey data from the Ponemon Institute shows what cloud security measures respondents thought were most important.

Experts Share Compliance Tactics

- Companies can help ease the pain of standards compliance by integrating efforts into daily routines and conducting ongoing inventory checks.

CHART: Sources of Corporate Data Breaches

- Insiders committed 43 percent of all security breaches.

Lessons Learned from Trident Breach

- A panel of law enforcement experts who spoke at the recent FOSE conference in Washington, D.C., discussed some of the operation’s key lessons as well as the current state of law enforcement’s anti-cybercrime efforts.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.