What Makes the Smart Grid Special, Makes it Vulnerable

Despite its enormous benefits, many smart-grid critics see looming danger.

Spam Plunges While Attacks Rise

A new report finds that e-mail spam decreased by half last year, while search engine malware and Twitter crime rates skyrocketed.

Lack of Trust Thwarts Cybersecurity Information Sharing

Lack of trust is the primary reason cybervulnerability and threat data are not shared within and between the public and private sectors, a panel of government and industry representatives told a homeland security conference today.

Patients Uneasy About Security of Electronic Health Records

A new survey finds patients wary of the move to electronic health records and the ability of their healthcare providers to secure them.

"Trust No One," Advises Report on Business Network Security

Whether malicious or not, a company's own employees can be the biggest threat to network security, according to a new Forrester Research report.

Standards and SaaS: Security's Big Trends at Seminar

Software as a service (SaaS) and standardization were all the rage at the ASIS International 56th Annual Seminar and Exhibits.

Smartphone Data Easily Stolen, IT Security Expert Shows

In a video demonstration with the BBC, an IT security expert demonstrates how easy it is for criminals to set up a fake WiFi hotspot to steal information from an unsuspecting victim's smartphone among other ploys.

Bank's Free Secure Browser Solution Defends Against Online Fraud

Utah-based Zions Bank provides a free browser security solution to customers to combat online banking fraud.

Morning Security Brief: Data Protection, Information Sharing, Terrorism Financing, and More.

The European Commission is revising its data protection rules, which could change how law enforcement can use personal data, among other things. White House sets in motion effort to make uniform the classification of controlled unclassified information among agencies to streamline information sharing, which could help with homeland security intelligence analysis. And more.

Google Crowd Sources Security

Google, the Internet's dominant search engine, has initiated an experimental new program to help it find the security vulnerabilities of its Web properties that display or manage highly sensitive authenticated user data. It is crowd sourcing the task, inviting anyone to find bugs or other vulnerabilities; those who do will be awarded prize money for their work.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.