INFORMATION

Site Map - IT

Editor's Note: Innovations to Ring in the New Year

- A look at how some security companies are innovating to improve designs and services.

Data Breach

- An appeals court ruled that healthcare customers who suffered identity theft may sue the company after laptops containing customer data were stolen. The company argued that the customers had no standing.

Computer Crime

- An employee who downloaded confidential documents before going to a competitor did not violate the Computer Fraud and Abuse Act. The law, ruled the court, applies to those who access data without authorization.

Cyber Warfare: Techniques, Tactics, and Tools for Security Practitioners

- Apparently aimed at a military audience, this book offers concepts and examples largely from the U.S. military.

Protecting Against Cyberthreats

- Threats to the infrastructure are both real and growing. These insiders discuss the nature of the threat and what can be done to mitigate it.

VIDEO: Disconnect Shows How Browser Sessions Get Hijacked and How to Protect Them

- Disconnect, Inc., has created a browser extension to help users surf the Web securely and keep sites from tracking their browsing habits.

Creating a Digital Evidence Policy

- Now that most court cases involve digital evidence analysis, companies should develop a policy on retaining such documents.

Cybercrime

- The rates of cybercrime attacks on U.S. companies have risen since 2010, according to a study conducted by the Ponemon Institute and sponsored by HP. Read the study here.

CHART: Behind The Numbers

- Security tools lag behind security policies.

Creating a Digital Evidence Policy

- Now that most court cases involve digital evidence analysis, companies should develop a policy on retaining such documents.

Federal Cybersecurity Perspective: Interview with Laura Mather, Ph.D.

- An interview with Dr. Laura Mather, cofounder and chief visionary of Silver Tail Systems.  

Thor’s Microsoft Security Bible

- This book presents a fascinating collection of practical and immediately implementable Microsoft security techniques, processes, and meth­odologies uniquely illustrated through real-world process examples.

Medical Billing Company Says Employee Leaked Data to Identity Theft Ring

- Florida-based Advanced Data Processing, Inc. says an employee illegally accessed the ambulance billing system and leaked individual account information to a group suspected of filing fraudulent tax returns.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.