INFORMATION

Site Map - IT

Creating a Digital Evidence Policy

- Now that most court cases involve digital evidence analysis, companies should develop a policy on retaining such documents.

Cybercrime

- The rates of cybercrime attacks on U.S. companies have risen since 2010, according to a study conducted by the Ponemon Institute and sponsored by HP. Read the study here.

CHART: Behind The Numbers

- Security tools lag behind security policies.

Creating a Digital Evidence Policy

- Now that most court cases involve digital evidence analysis, companies should develop a policy on retaining such documents.

Federal Cybersecurity Perspective: Interview with Laura Mather, Ph.D.

- An interview with Dr. Laura Mather, cofounder and chief visionary of Silver Tail Systems.  

Thor’s Microsoft Security Bible

- This book presents a fascinating collection of practical and immediately implementable Microsoft security techniques, processes, and meth­odologies uniquely illustrated through real-world process examples.

Medical Billing Company Says Employee Leaked Data to Identity Theft Ring

- Florida-based Advanced Data Processing, Inc. says an employee illegally accessed the ambulance billing system and leaked individual account information to a group suspected of filing fraudulent tax returns.

Morning Security Brief: Syria Disconnected, Parastoo Speaks, Pan-Arab Security Conference, and More

- Syria’s Internet is offline. The IAEA is targeted by a hacker called Parastoo. And the Pan-Arab security conference wraps up in Riyadh.

Surveillance System Technology Trends

- It’s getting easier to have surveillance systems that don’t overwhelm the network or storage systems.

Morning Security Brief: Cyber Monday Safety, Bank Fined for Lack of Protection, Bangladesh Factory Fires, and More

- Staying safe on Cyber Monday. Britain fines a bank for failing to implement risk management practices that could have prevented billions of dollars worth of fraud. Police open a negligence investigation as protests begin in the wake of Bangladesh factory fires. And more.

Photos of Prince William Reveal 'Sensitive' Information and Login Credentials

- Tip: Don’t post network login details on the wall – especially if you’re working for the Ministry of Defence.

Has a Hacker Figured Out How to Hide Malicious Sites Inside Search Results?

- Websense threat researchers think a Chinese hacker may have found a way to exploit Google’s convenient optical character recognition to make malicious urls more visible in Google search results.

Michigan Man Charged with Selling Fake Microsoft Software

- A Michigan man was arraigned last week in the U.S. District Court for the Eastern District of Michigan on charges of mail fraud and selling counterfeit Microsoft software worth more than $1.2 million, according to the Department of Justice.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.