INFORMATION

Site Map - SM Online

You Tube

- IBM has created a short video of the company's new RFID tag known as the Clipped Tag a label that consumers can easily tear off once they leave a store after a purchase. This and other security videos are on You Tube.

School Safety

- Bullhead City is one of the cases discussed in a Department of Justice guide to innovative approaches to school security undertaken by schools and communities.

Agro-Guard

- Learn how Agro-Guard, a community policing program developed by the Kansas Bureau of Investigation and the Dodge City Sheriff's department, can help police and producers spot threats and prevent agroterrorism.

Smart Cards

- The Corporate IT Outlook for 2007, a new report from research firm EQUS, looks at the reasons that increasing numbers of companies are implementing smart cards while few plan to implement biometrics.

Corruption

- Corruption remains a significant problem facing international businesses and may even be worsening, according to this survey by Control Risks, which found that honest businesses may be losing out to dishonest competitors.

Security Offensive

- A new guide from the National Institute of Standards and Technology explains the key threats to, and recommends guidance for, securing industrial control systems.

Cybersecurity Progress

- The Homeland Security Department is still struggling to fulfill its cybersecurity responsibilities, according to this report from the Government Accountability Office.

Burglary

- The problem of burglary at residential construction sites and strategies for preventing the problem—such as implanting microchips in power tools—are topics addressed in this guide from the Department of Justice.

Transportation Security

- Emergency response coordinators in the Transporation Security Administration are not receiving training in continuity of operations, despite the existence of free courses, according to a report from the Office of the Inspector General at the Department of Homeland Security.

Data Security Toolkit

- Credit card data are often improperly stored in a merchant’s database, leading to data breaches. The U.S. Chamber of Commerce has joined with Visa in developing a Security Toolkit designed to help programmers understand and counter the most common vulnerabilities to data breaches.

Check Fraud

- A registry of check security features, which is designed to combat check fraud, is now available to institutions. The registry provides a single place for security-feature providers to register their features.

Terrorist Watch List

- Millions of visitors are screened for terrorism links through government watch lists.

Consumer Data Protection

- The FCC orders telecoms to implement more stringent safeguards to protect consumer data. Safeguards include password verification before providing records by phone.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.