INFORMATION

Site Map - IT

Virtual Desktops and Security

- A virtual desktop environment can help companies securely manage “bring your own device” policies by controlling access to corporate information.

Morning Security Brief: Cloud Security Lacking, Good and Bad Hackers, and Defense Budget Cut Dangers

- The majority of companies do not secure data stored on the cloud due to concerns that it will hamper usability and access. The FBI has added five new hackers to its cyber "most wanted" list. A new program encourages white hat hackers to report bugs for cash. And Defense Secretary Chuck Hagel voices his concerns about the effects of defense budget cuts.

Cybercrime

- In a report titled Threats on the Horizon: The Rise of the Advanced Persistent Threat, Fortinet takes a look at the evolution of advanced persistent threats, how they typically operate, and the actors behind this cyberattack vector.

Safeguarding Critical E-Documents: Implementing a Program for Securing Confidential Information Assets

- Author Robert Smallwood, executive director of the E-Records Institute at IMERGE Consulting, examines electronic information asset protection measures in Safeguarding Critical E-Documents. The book evaluates significant case studies, explains various risks and vulnerabilities, and covers a spectrum of useful topics.

Countering the Persistent Threat

- A growing and nefarious cyberattack category, called advanced persistent threats, is a major concern for both governments and private enterprises that want to prevent their proprietary information from being stolen or damaged.

Choosing the Right Cloud Computing Model

- Whether it is better to house data in a public or private cloud depends on a company’s security and compliance needs as well as its risk tolerance.

Morning Security Brief: Update on Aborted Navy SEAL Raid, Social Security Fraud, Shutdown's Effects on Cybersecurity, and More

- Members of elite Navy SEAL team 6 aborted an operation to capture a terrorist in Somalia because children were nearby; investigation reveals fraud in the Social Security Administration's Disability Program; the U.S. government shutdown is hurting cybersecurity efforts; and more.

Cloud Technology

- Companies are increasingly turning to cloud-computing technology to manage their informational assets. This 2013 study by IDG Enterprise looks at facts and figures behind the types of cloud services businesses are choosing.  

Case Study

- The New York State Bridge Authority needed a sophisticated surveillance system that could detect anomalies, such as stopped cars, on five bridges spanning the Hudson River.

Behind the Numbers

- Cybercrime in Context

Computing in the Cloud

- Whether it is better to house data in a public or private cloud depends on a company’s security and compliance needs as well as its risk tolerance.

Morning Security Brief: Negotiations Continue on Syria, Legislation Thwarted by Leaks, Cargo Truck Safety Questioned, and More

- Secretary of State John Kerry rejects Syrian President Bashar al-Assad’s proposed timetable for turning over chemical weapons. Lawmakers say that cybersecurity legislation has been slowed by the Snowden leaks. Incidents involving cargo trucks that leak flammable liquid are not tracked by the government.

Cybersecurity

- Prolexic, a network security solutions company that provides mitigation against DDoS attacks, has published a report containing the latest facts and statistics on DDoS attacks from the second quarter of 2013 here.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.