INFORMATION

Site Map - Cybersecurity

Worth a Look: VaporStream

- VaporStream takes message security to the next level for even the most privacy-conscious customer.

Data Breach Preparedness Plan

- An integral, but often overlooked, part of any corporate data security plan is caring for customers after an incident.

Cloud Security and Compliance Basics

- Understanding the types of services and security cloud computing providers offer is key to meeting compliance goals.

Behind the Numbers

- Compliance overtakes security concerns as the primary reason for encrypting data. -----------------------------------------------------------------------------  

Numbers

- 27 The percent of companies that suffered from data theft last year, according to the latest Kroll Global Fraud Report, which polled about 800 international executives.

Squelching Attacks with Splunk

- Splunk can help IT departments easily analyze patterns of potential threat activity.

Directing Privacy Policies at Consumers

- Companies need to make data privacy policies shorter and easier to understand, according to government representatives and industry experts.

Behind the Numbers

- Primary reasons companies aren't adopting pay-per-use hosting of virtual servers.

Behind the Numbers

- Forrester Research, Inc. asks what are the top IT priorities for small and mid-size businesses.

Zero Trust Model

- Information security professionals should readjust some widely held views on how to combat cyber risks, according to a new Forrester Research report.

Numbers

- 54 The percentage of people who feel guilty or hold themselves responsible for falling victim to cybercrime, according to Symantec’s Cybercrime Report: The Human Impact. Slightly more respondents, 58 percent, reported feeling angry; 65 percent of the 7,000 global computer users polled said they had been victimized by some form of cybercrime.

Virtual Healthcare

- One medical facility improved access and security by replacing traditional desktop computers with virtual desktops accessed through thin clients.

Be Smart About IDs

- Two takes on the implementation of smart card access control systems.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.