INFORMATION

Site Map - SM Online

RISKS AND COMPETENCIES

-  The ASIS Foundation and the University of Phoenix have released The Security Industry Survey of Risks and Professional Competencies, a security industry survey and research report that sheds light on the crucial talent and training needs of this high-growth industry. The survey was initiated to identify top enterprise security risks; to better understand the industry’s talent needs; and to generate actionable recommendations for strengthening the industry’s work force.

INTERNET OF THINGS

-  At least 70 percent of devices that make up the Internet of Things (IoT) are vulnerable to attack, according to a report from Hewlett-Packard’s security unit Fortify, released in July. The study analyzed a range of IoT devices, from remote power outlets to home alarms and even sprinkler controllers. According to the study, vulnerabilities include weak passwords, insecure password recovery mechanisms, and poorly protected credentials.  

CRIME

-  Researchers at Sandia National Laboratories studied high-value heists of the last three decades to discover principles for designing security systems to protect vital assets. Their conclusions are reported in The Perfect Heist: Recipes from Around the World.

POWER GRID

-  A new Congressional Research Service report finds that high-voltage transformers, which carry 60 to 70 percent of the nation’s electricity, are vulnerable to terrorist attack. Physical Security of the U.S. Power Grid: High-Voltage Transformer Substations reports that such an attack could have catastrophic consequences.  

BIOSAFETY

-   Recent incidents involving hazardous anthrax and bird flu samples at government laboratories have raised concerns about safety violations that might be occurring at other sensitive labs. A Government Accountability Office publication, High-Containment Laboratories: Recent Incidents of Biosafety Lapses, explores the latest incidents at high-containment laboratories and discusses the importance of a national standard for operating the facilities. The report found that there is a continuing lack of oversight and assessment in high-containment labs, which may contribute to future safety lapses.

A MODEL FOR REGULATIONS

- A new report from the Stimson Center advocates a new collaborative method for designing government regulations that involves the private sector from the start. The report, Partners in Prevention: Making Public-Private Security Cooperation More Efficient, Effective and Sustainable, was inspired by regulatory action designed to improve air cargo safety after printer cartridges packed with explosives nearly made their way to the United States.

SPACE SECURITY

- Security consulting group IOActive released a white paper A Wake-up Call for SATCOM Security detailing vulnerabilities in satellite systems that keep aircraft, ships, and army personnel safe. Also, read the testimony of Douglas Loverro, deputy assistant secretary of defense for space policy, as he explained the importance of space surveillance in critical infrastructure industries during a hearing before the Senate Armed Services Committee.

CYBERBULLYING

- Cyberbullying has tripled over the last year, according to McAfee’s 2014 Teens and the Screen Study: Exploring Online Privacy, Social Networking and Cyberbullying. The study found that 87 percent of youth reported witnessing cyberbullying over the last year, compared to the previous study in which just 27 percent said they had observed cruel online behavior.

CRIME IN SPORTS

- Protecting the Integrity of Sport Competition: The Last Bet for Modern Sport, jointly issued by The University of Paris 1 Panthéon-Sorbonne and the International Centre for Sport Security, is the result of a two-year research project. The issuing institutions say it is the first-ever comprehensive report into the scale and scope of illegal activity related to sports.

DATA BREACH VICTIMS

- A recent report jointly conducted by Experian and the Ponemon Institute surveyed consumers who were victims of data breaches. In the report, The Aftermath of a Mega Data Breach: Consumer Sentiment, 63 percent of consumers said they believe the company where the data breach occurred should be obligated to provide identity theft protection to affected parties, and 67 percent wanted compensation such as cash, products, or services.

CORRUPTION

- More than one in four people report having paid a bribe in the last 12 months when interacting with key public institutions and services and governments are not perceived as doing enough to hold the corrupt accountable. In the 2013 Global Corruption Barometer, Transparency International breaks down how widespread corruption is globally and how individual countries are handling the problem.

DATA BREACHES

- Verizon identified nine patterns that describe 92 percent of the confirmed data breaches it collected in 2013. Learn about these patterns and gain insight into cyber espionage and denial-of-service attacks in the company’s 2014 Data Breach Investigations Report.

LEADERSHIP GAP

- A new report from an international executive search company describes a global leadership shortage. Conducted by Stanton Chase International, the research behind 2013 Global Industrial Strategy Survey: Planning for 2014 and Beyond finds a lack of leaders with vision, high-level strategic thinking ability, and global leadership skills.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.