Site Map - Cybersecurity

Can ISPs Help Beat Botnets?

- To fight hackers, companies are informing customers of threats, creating public-private partnerships, and devising security standards.

Worth a Look: CamCam

- A new application called CamCam, offers a good balance of quality, ease of use, and cost for someone who wants a limited home surveillance option.

Firms Flock to Managed Services

- Before organizations contract with managed security services providers, they should clarify their needs and expectations.

Ranking of Cloud Security Measures

-  Survey data from the Ponemon Institute shows what cloud security measures respondents thought were most important.

Experts Share Compliance Tactics

- Companies can help ease the pain of standards compliance by integrating efforts into daily routines and conducting ongoing inventory checks.

CHART: Sources of Corporate Data Breaches

- Insiders committed 43 percent of all security breaches.

Lessons Learned from Trident Breach

- A panel of law enforcement experts who spoke at the recent FOSE conference in Washington, D.C., discussed some of the operation’s key lessons as well as the current state of law enforcement’s anti-cybercrime efforts.

Police Embrace Social Media

- Police departments are finding that social media can be used to gather tips and feedback from the public.

The Cost of Cybercrime

- Take a look at the cost of cybercrime by type of attack.

Manulife Outsources VM Scanning

- A financial services company found a cloud-based service that could help scan its network for weaknesses.

Behind The Numbers

- Types of Data on Lost or Stolen Mobile Devices

The Lure of Spearphishing

- Behind the numbers of a typical spearphishing campaign.

Bolstering Security Education

- Many security managers say end-user education is a central part of IT security. More regulations are also requiring that organizations demonstrate that they’re conducting such training.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.