SM Online: Hiring \ Employment Issues
08/29/2014 - A new report from the Stimson Center advocates a new collaborative method for designing government regulations that involves the private sector from the start. The report, Partners in Prevention: Making Public-Private Security Cooperation More Efficient, Effective and Sustainable, was inspired by regulatory action designed to improve air cargo safety after printer cartridges packed with explosives nearly made their way to the United States.
SM Online: Homeland Security
08/29/2014 - Security consulting group IOActive released a white paper A Wake-up Call for SATCOM Security detailing vulnerabilities in satellite systems that keep aircraft, ships, and army personnel safe.
Also, read the testimony of Douglas Loverro, deputy assistant secretary of defense for space policy, as he explained the importance of space surveillance in critical infrastructure industries during a hearing before the Senate Armed Services Committee.
SM Online: Cybercrime
08/29/2014 - Cyberbullying has tripled over the last year, according to McAfee’s 2014 Teens and the Screen Study: Exploring Online Privacy, Social Networking and Cyberbullying. The study found that 87 percent of youth reported witnessing cyberbullying over the last year, compared to the previous study in which just 27 percent said they had observed cruel online behavior.
SM Online: Crime
Protecting the Integrity of Sport Competition: The Last Bet for Modern Sport, jointly issued by The University of Paris 1 Panthéon-Sorbonne and the International Centre for Sport Security, is the result of a two-year research project. The issuing institutions say it is the first-ever comprehensive report into the scale and scope of illegal activity related to sports.
SM Online: ID issues \ Identity Theft
07/08/2014 - A recent report jointly conducted by Experian and the Ponemon Institute surveyed consumers who were victims of data breaches. In the report, The Aftermath of a Mega Data Breach: Consumer Sentiment, 63 percent of consumers said they believe the company where the data breach occurred should be obligated to provide identity theft protection to affected parties, and 67 percent wanted compensation such as cash, products, or services.
SM Online: Crime
07/08/2014 - More than one in four people report having paid a bribe in the last 12 months when interacting with key public institutions and services and governments are not perceived as doing enough to hold the corrupt accountable. In the 2013 Global Corruption Barometer, Transparency International breaks down how widespread corruption is globally and how individual countries are handling the problem.
SM Online: Cybercrime
07/08/2014 - Verizon identified nine patterns that describe 92 percent of the confirmed data breaches it collected in 2013. Learn about these patterns and gain insight into cyber espionage and denial-of-service attacks in the company’s 2014 Data Breach Investigations Report.
SM Online: Security Management
07/08/2014 - A new report from an international executive search company describes a global leadership shortage. Conducted by Stanton Chase International, the research behind 2013 Global Industrial Strategy Survey: Planning for 2014 and Beyond finds a lack of leaders with vision, high-level strategic thinking ability, and global leadership skills.
SM Online: Contract Management
07/08/2014 - The U.S. government is moving to make continuous evaluation part of the security clearance process beginning this fall. The U.S. Office of Management and Budget illustrates the timeline for implementation in its Suitability and Security Processes Review, a report to President Barack Obama that was released in February 2014.
SM Online: Legislation
06/13/2014 - Australia has enacted a new amendment that will broaden the definition of personal information and require more transparency from organizations on how that personal information is stored. The new law, The Privacy Regulation 2013, is part of the broader Privacy Amendment Act of 2012 and applies to companies with revenues of more than AUD 3 million that collect information, such as names, contact details, payment information, or other details related to a specific person, for any purpose.
SM Online: Best Practices \ Case Studies
06/13/2014 - Two newly updated books on Crime Prevention Through Environmental Design, or CPTED, are available now from the ASIS Store. Look for item #2163, the third edition of Crime Prevention Through Environmental Design by Timothy Crowe and updated by Lawrence Fennelly, and item number #2078, the second edition of 21st Century Security and CPTED by Randy Atlas, CPP.
SM Online: Legal Issues
06/13/2014 - A federal court has ruled that the Federal Trade Commission (FTC) can advance with a lawsuit against a hotel group for allegedly failing to safeguard consumers’ personal information. The FTC accused the Wyndham Worldwide Corporation of failing to implement adequate security in its computer system, which led to three data breaches between April 2008 and January 2010.
SM Online: Research & Studies
06/13/2014 - The 2014 Security Threat Report from Sophos explores the latest trends in cybersecurity and the most malicious threats to enterprises, government, and individuals on a global scale. The report looks at risks like targeted threats to financial accounts, Android malware, and the end of support updates for Microsoft’s Windows XP operating system.