INFORMATION

Site Map - SM Online

Privacy

- Privacy issues that arise when companies outsource services involving clients’ personal health information are examined in this GAO report.

Mail Security

- The GAO gives recommendations to the Defense Department on how to improve the response to an attack on mail facilities.

Terrorism Insurance

- Measuring and predicting losses that might occur from unconventional weapons is rife with difficulties, as this GAO report discusses.

Food-Borne Illness

- A wide range of intentional and accidental threats must be countered to protect the U.S. food supply; learn more from this Institute of Medicine of the National Academies report.

Bully Battle

- The International Association of Chiefs of Police has an antibullying program that can reduce the teasing that can lead to violence.

Unbiased Investigations

- An FBI Law Enforcement Bulletin piece discusses various cognitive biases that lead investigators astray, and offers strategies to combat them.

Identity Theft

- Find out how the Energy Department is preparing to prevent and respond to nuclear attacks in the United States.

Outbound Data

- Iowa State University conducted a survey and found that only 30 percent of companies monitor the content of outbound e-mails. See further findings online.

Security Controls

- Computer security in government needs help, and NIST has stepped up to the plate with Recommended Security Controls for Federal Information Systems.

Homeland Security

- To find out what’s at risk in Iowa, read the full interview with David L. Miller, administrator, Iowa Homeland Security and Emergency Management Division.

Dogs and Detection

- Guidelines have been proposed pertaining to how explosives-detection dogs should be trained and certified, among other issues. There’s still time to comment on the drafts.

Security Survey

- A 2006 Global Security Survey highlights an increase in the number of security breaches, among other findings.

Safe Internet Practices

- NIST has issued a number of new draft guides containing recommendations on various aspects of Internet security, including e-mail and Web applications.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.