INFORMATION

Site Map - IT

Seeing the Signs

- Companies can employ technological tools to help them catch possible insider threats.

Cyber Pirates Sail the Digital Seas

-  The U.S. Justice Department brought its first criminal espionage charges against nation-state actors in May when it accused five Chinese officials of hacking into the networks of six American businesses.

Cyber Crusaders

- Penetration testing services offer organizations the opportunity to find out where the vulnerabilities in their networks exist without suffering through an actual security breach.

INTERNET OF THINGS

-  At least 70 percent of devices that make up the Internet of Things (IoT) are vulnerable to attack, according to a report from Hewlett-Packard’s security unit Fortify, released in July. The study analyzed a range of IoT devices, from remote power outlets to home alarms and even sprinkler controllers. According to the study, vulnerabilities include weak passwords, insecure password recovery mechanisms, and poorly protected credentials.  

Managing the BYOD Revolution

- Personal digital devices are so popular that employees are bringing them into the workplace without management approval. This bring-your-own-device (BYOD) trend can lead to security threats.

Q & A

- What are today’s biggest malware challenges?

Hackers in High Demand

- A study explores the shortage of cybersecurity professionals in the U.S. labor market.

Service Denied

- Distributed denial of service attacks continue to grow in both size and scope.

SHORTAGE OF CYBERSECURITY PROS

- A recent RAND report outlines the dearth of cybersecurity professionals in the U.S. labor market and highlights what private and public organizations are doing to address the problem.

Morning Security Brief: Five Million Gmail Account Credentials Revealed, Salesforce Malware, and Cybersecurity Summit Wrapup

- Nearly five million Gmail usernames and passwords have been made public by Russian hackers, Salesforce has warned its customers of targeted malware aimed at stealing login credentials, and cybersecurity experts gathered to discuss protecting sales systems.

A Fierce Domain: Conflict in Cyberspace, 1986 to 2012

- This book sturdily lives up to the billing on its jacket as “the first history of twenty-five years of conflict in cyberspace.”

Chief Compliance Officer's Responsibility for Cybersecurity

- Who is responsible for data privacy laws and cybersecurity?

In Plain Sight

- Uses of the dark web are vast, and privacy advocates and law enforcement are struggling over how to maintain its use for legitimate activity.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.