INFORMATION

Site Map - IT

INTERNET OF THINGS

-  At least 70 percent of devices that make up the Internet of Things (IoT) are vulnerable to attack, according to a report from Hewlett-Packard’s security unit Fortify, released in July. The study analyzed a range of IoT devices, from remote power outlets to home alarms and even sprinkler controllers. According to the study, vulnerabilities include weak passwords, insecure password recovery mechanisms, and poorly protected credentials.  

Managing the BYOD Revolution

- Personal digital devices are so popular that employees are bringing them into the workplace without management approval. This bring-your-own-device (BYOD) trend can lead to security threats.

Q & A

- What are today’s biggest malware challenges?

Hackers in High Demand

- A study explores the shortage of cybersecurity professionals in the U.S. labor market.

Service Denied

- Distributed denial of service attacks continue to grow in both size and scope.

SHORTAGE OF CYBERSECURITY PROS

- A recent RAND report outlines the dearth of cybersecurity professionals in the U.S. labor market and highlights what private and public organizations are doing to address the problem.

Morning Security Brief: Five Million Gmail Account Credentials Revealed, Salesforce Malware, and Cybersecurity Summit Wrapup

- Nearly five million Gmail usernames and passwords have been made public by Russian hackers, Salesforce has warned its customers of targeted malware aimed at stealing login credentials, and cybersecurity experts gathered to discuss protecting sales systems.

A Fierce Domain: Conflict in Cyberspace, 1986 to 2012

- This book sturdily lives up to the billing on its jacket as “the first history of twenty-five years of conflict in cyberspace.”

Chief Compliance Officer's Responsibility for Cybersecurity

- Who is responsible for data privacy laws and cybersecurity?

In Plain Sight

- Uses of the dark web are vast, and privacy advocates and law enforcement are struggling over how to maintain its use for legitimate activity.

Data Breach Jigsaw

- Varying state data breach notification laws make it difficult for companies to navigate the legal landscape in the event of a security incident.

DATA BREACH VICTIMS

- A recent report jointly conducted by Experian and the Ponemon Institute surveyed consumers who were victims of data breaches. In the report, The Aftermath of a Mega Data Breach: Consumer Sentiment, 63 percent of consumers said they believe the company where the data breach occurred should be obligated to provide identity theft protection to affected parties, and 67 percent wanted compensation such as cash, products, or services.

DATA BREACHES

- Verizon identified nine patterns that describe 92 percent of the confirmed data breaches it collected in 2013. Learn about these patterns and gain insight into cyber espionage and denial-of-service attacks in the company’s 2014 Data Breach Investigations Report.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.