INFORMATION

Site Map - IT

Morning Security Brief: Senior Managers Pose Greatest Security Threat, LinkedIn Sues Phishers, Network Security Spending Up

- Senior managers pose the greatest risk to corporate security, a study shows. LinkedIn is suing unknown hackers in an attempt to learn their identities. And network security spending is expected to double in 2014.

Behind the Numbers

- Time It Takes to Analyze Malware

Introduction to Computer Networks and Cybersecurity

- To use a boxing analogy, Introduction to Computer Networks and Cybersecurity is a superheavyweight of a book, coming in at nearly 10 pounds and more than 1,300 pages. And there is hardly a networking or data security topic that is not detailed in this reference.

Reputation Protection

- Companies have to monitor their reputations online. Luckily, there are companies that offer services to make that easier.

Threat Reporting Made Easy

- A new online reporting tool makes it more likely that this community college will learn about troubled students before they spin out of control.

Virtual Desktops and Security

- A virtual desktop environment can help companies securely manage “bring your own device” policies by controlling access to corporate information.

Morning Security Brief: Cloud Security Lacking, Good and Bad Hackers, and Defense Budget Cut Dangers

- The majority of companies do not secure data stored on the cloud due to concerns that it will hamper usability and access. The FBI has added five new hackers to its cyber "most wanted" list. A new program encourages white hat hackers to report bugs for cash. And Defense Secretary Chuck Hagel voices his concerns about the effects of defense budget cuts.

Cybercrime

- In a report titled Threats on the Horizon: The Rise of the Advanced Persistent Threat, Fortinet takes a look at the evolution of advanced persistent threats, how they typically operate, and the actors behind this cyberattack vector.

Safeguarding Critical E-Documents: Implementing a Program for Securing Confidential Information Assets

- Author Robert Smallwood, executive director of the E-Records Institute at IMERGE Consulting, examines electronic information asset protection measures in Safeguarding Critical E-Documents. The book evaluates significant case studies, explains various risks and vulnerabilities, and covers a spectrum of useful topics.

Countering the Persistent Threat

- A growing and nefarious cyberattack category, called advanced persistent threats, is a major concern for both governments and private enterprises that want to prevent their proprietary information from being stolen or damaged.

Choosing the Right Cloud Computing Model

- Whether it is better to house data in a public or private cloud depends on a company’s security and compliance needs as well as its risk tolerance.

Morning Security Brief: Update on Aborted Navy SEAL Raid, Social Security Fraud, Shutdown's Effects on Cybersecurity, and More

- Members of elite Navy SEAL team 6 aborted an operation to capture a terrorist in Somalia because children were nearby; investigation reveals fraud in the Social Security Administration's Disability Program; the U.S. government shutdown is hurting cybersecurity efforts; and more.

Cloud Technology

- Companies are increasingly turning to cloud-computing technology to manage their informational assets. This 2013 study by IDG Enterprise looks at facts and figures behind the types of cloud services businesses are choosing.  
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.