INFORMATION

Site Map - IT

Data Protection

- The IT Risk/Reward Barometer, conducted by the nonprofit global association ISACA, examines the gaps between what people believe and what they do when it comes to the Internet and sharing information online. For example, people tend to fear that their information is at risk, but most continue to be careless with their passwords.

NIST Releases Cybersecurity Framework

- The National Institute of Standards and Technology takes comments from the public on guidelines for protecting networks.

Cybersecurity

- The National Institute of Standards and Technology (NIST) has released the preliminary version of its cybersecurity framework for critical infrastructure. The voluntary guidelines were crafted by NIST with the help of private sector input and engagement with industry stakeholders. The final version of the framework is due in April.

Morning Security Brief: Hacking Costs Mount, States and Cybersecurity, Security Becoming Laid Back in Sochi, and More

- The roughly 40 million compromised cards in the Target hack have cost more than $200 million to replace. Change your Kickstarter password, says CEO. Maryland and Ohio are two states where cybersecurity is taking up residence and making an impact. And, after more than a week of pure sports and no terrorism, security at Sochi is becoming more mellow.

Network Intrusion Solutions

- When network administrators understand how intrusions occur, they can defend against future attacks.

Morning Security Brief: Senior Managers Pose Greatest Security Threat, LinkedIn Sues Phishers, Network Security Spending Up

- Senior managers pose the greatest risk to corporate security, a study shows. LinkedIn is suing unknown hackers in an attempt to learn their identities. And network security spending is expected to double in 2014.

Behind the Numbers

- Time It Takes to Analyze Malware

Introduction to Computer Networks and Cybersecurity

- To use a boxing analogy, Introduction to Computer Networks and Cybersecurity is a superheavyweight of a book, coming in at nearly 10 pounds and more than 1,300 pages. And there is hardly a networking or data security topic that is not detailed in this reference.

Reputation Protection

- Companies have to monitor their reputations online. Luckily, there are companies that offer services to make that easier.

Threat Reporting Made Easy

- A new online reporting tool makes it more likely that this community college will learn about troubled students before they spin out of control.

Virtual Desktops and Security

- A virtual desktop environment can help companies securely manage “bring your own device” policies by controlling access to corporate information.

Morning Security Brief: Cloud Security Lacking, Good and Bad Hackers, and Defense Budget Cut Dangers

- The majority of companies do not secure data stored on the cloud due to concerns that it will hamper usability and access. The FBI has added five new hackers to its cyber "most wanted" list. A new program encourages white hat hackers to report bugs for cash. And Defense Secretary Chuck Hagel voices his concerns about the effects of defense budget cuts.

Cybercrime

- In a report titled Threats on the Horizon: The Rise of the Advanced Persistent Threat, Fortinet takes a look at the evolution of advanced persistent threats, how they typically operate, and the actors behind this cyberattack vector.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.