SM Online: Research & Studies
02/26/2014 - The National Institute of Standards and Technology (NIST) has released the preliminary version of its cybersecurity framework for critical infrastructure. The voluntary guidelines were crafted by NIST with the help of private sector input and engagement with industry stakeholders. The final version of the framework is due in April.
Daily Headline : International
02/19/2014 - The roughly 40 million compromised cards in the Target hack have cost more than $200 million to replace. Change your Kickstarter password, says CEO. Maryland and Ohio are two states where cybersecurity is taking up residence and making an impact. And, after more than a week of pure sports and no terrorism, security at Sochi is becoming more mellow.
Cybersecurity: IT Security
01/29/2014 - When network administrators understand how intrusions occur, they can defend against future attacks.
Daily Headline : Cybercrime
01/09/2014 - Senior managers pose the greatest risk to corporate security, a study shows. LinkedIn is suing unknown hackers in an attempt to learn their identities. And network security spending is expected to double in 2014.
Cybersecurity: Web-based Threats
12/31/2013 - Time It Takes to Analyze Malware
Book Reviews: Web-based Threats
12/30/2013 - To use a boxing analogy, Introduction to Computer Networks and Cybersecurity is a superheavyweight of a book, coming in at nearly 10 pounds and more than 1,300 pages. And there is hardly a networking or data security topic that is not detailed in this reference.
12/30/2013 - Companies have to monitor their reputations online. Luckily, there are companies that offer services to make that easier.
Case Study: Education
12/06/2013 - A new online reporting tool makes it more likely that this community college will learn about troubled students before they spin out of control.
Daily Headline : IT Security
11/07/2013 - A virtual desktop environment can help companies securely manage “bring your own device” policies by controlling access to corporate information.
Daily Headline : Cybercrime
11/07/2013 - The majority of companies do not secure data stored on the cloud due to concerns that it will hamper usability and access. The FBI has added five new hackers to its cyber "most wanted" list. A new program encourages white hat hackers to report bugs for cash. And Defense Secretary Chuck Hagel voices his concerns about the effects of defense budget cuts.
SM Online: IT Security
10/28/2013 - In a report titled Threats on the Horizon: The Rise of the Advanced Persistent Threat, Fortinet takes a look at the evolution of advanced persistent threats, how they typically operate, and the actors behind this cyberattack vector.
Book Reviews: Proprietary Information Protection
10/25/2013 - Author Robert Smallwood, executive director of the E-Records Institute at IMERGE Consulting, examines electronic information asset protection measures in Safeguarding Critical E-Documents. The book evaluates significant case studies, explains various risks and vulnerabilities, and covers a spectrum of useful topics.
IT: IT Security
10/25/2013 - A growing and nefarious cyberattack category, called advanced persistent threats, is a major concern for both governments and private enterprises that want to prevent their proprietary information from being stolen or damaged.