INFORMATION

Site Map - IT

RSA Conference Speaker Lauds IT Security Advancements

- Security industry professionals have made tremendous headway in developing and improving secure technologies over the past few decades. Creating more sophisticated methods of authentication, combating malware and spam, and battling the threat of cybercrime head-on are just a few of the advancements in the industry lauded by Scott Charney, corporate vice president of trustworthy computing at Microsoft. He spoke on Tuesday at the RSA Conference in San Francisco, California.

Behind the Numbers

- Actions companies took in 2012 to protect sensitive information.

White House Issues Executive Order on Cybersecurity

- President Barack Obama has issued a much-anticipated Executive Order on cybersecurity.

Morning Security Brief: Concerns about European Cybersecurity Strategy, Estonian Cybersecurity, Border Security, More

- Concerns are being raised about the European Commission's new cybersecurity strategy. Estonia is the poster child for cybersecurity. Homeland Security Secretary Napolitano says insistence that the border be secured before immigration reform is a flawed argument. A new GAO report says that the FCC was lax in security control for the Enhanced Secured Network Project.

Presidio Combats Fraud with IronKey

- One bank’s effort to improve transaction security.

Protecting Against Cyberthreats

- Threats to the infrastructure are both real and growing. These insiders discuss the nature of the threat and what can be done to mitigate it.

Protecting Children’s Privacy Online

- A proposed rule would limit the ability of companies to track and collect children’s online information.

Editor's Note: Innovations to Ring in the New Year

- A look at how some security companies are innovating to improve designs and services.

Data Breach

- An appeals court ruled that healthcare customers who suffered identity theft may sue the company after laptops containing customer data were stolen. The company argued that the customers had no standing.

Computer Crime

- An employee who downloaded confidential documents before going to a competitor did not violate the Computer Fraud and Abuse Act. The law, ruled the court, applies to those who access data without authorization.

Cyber Warfare: Techniques, Tactics, and Tools for Security Practitioners

- Apparently aimed at a military audience, this book offers concepts and examples largely from the U.S. military.

Protecting Against Cyberthreats

- Threats to the infrastructure are both real and growing. These insiders discuss the nature of the threat and what can be done to mitigate it.

VIDEO: Disconnect Shows How Browser Sessions Get Hijacked and How to Protect Them

- Disconnect, Inc., has created a browser extension to help users surf the Web securely and keep sites from tracking their browsing habits.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.