Security Is a Low Priority for Cloud Service Vendors, Study Finds

Security is a relatively low priority for many cloud service providers, according to a new study conducted by the Ponemon Institute.

Survey Responders Say They Don't Have an Accurate Picture of IT Risk

A new survey says there is still widespread misunderstanding of the impact user access reviews have on enterprise IT risk.

White House Releases Plan to Protect Identities and Grow Businesses Online

The Obama administration today unveiled its strategy to safeguard transactions in cyberspace by helping to create voluntary "secure, efficient, easy-to-use, and interoperable identity solutions."

What Makes the Smart Grid Special, Makes it Vulnerable

Despite its enormous benefits, many smart-grid critics see looming danger.

Spam Plunges While Attacks Rise

A new report finds that e-mail spam decreased by half last year, while search engine malware and Twitter crime rates skyrocketed.

Lack of Trust Thwarts Cybersecurity Information Sharing

Lack of trust is the primary reason cybervulnerability and threat data are not shared within and between the public and private sectors, a panel of government and industry representatives told a homeland security conference today.

Patients Uneasy About Security of Electronic Health Records

A new survey finds patients wary of the move to electronic health records and the ability of their healthcare providers to secure them.

"Trust No One," Advises Report on Business Network Security

Whether malicious or not, a company's own employees can be the biggest threat to network security, according to a new Forrester Research report.

Standards and SaaS: Security's Big Trends at Seminar

Software as a service (SaaS) and standardization were all the rage at the ASIS International 56th Annual Seminar and Exhibits.

Smartphone Data Easily Stolen, IT Security Expert Shows

In a video demonstration with the BBC, an IT security expert demonstrates how easy it is for criminals to set up a fake WiFi hotspot to steal information from an unsuspecting victim's smartphone among other ploys.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.