INFORMATION

Site Map - Research & Studies

Radiation Detection Machine Tests Inconclusive, Report Says

- Despite their previous statements that the radiation detection machines worked, DHS now says a new round of tests cannot show whether the machines can "detect and identify actual objects that might be smuggled."

Behind the Numbers: Factors Driving Interest in PC Alternatives

-

Quick Bytes: I Spy

- Spyware beat out viruses, worms, and browser-embedded attacks when 1,070 companies were asked to rank their biggest IT security concern in 2007.

Explosive Testing of Window Systems – the Underlying Double-Standard

- Explosive testing can reveal deficiencies in both new technologies and improperly designed window systems. Unfortunately, either through misinterpretation or ill-intent, compliance with selected test standards has been slowly falling by the wayside.

Virginia Tech, Kaine Lobby for Campus Security Study

- Funds sought for study to secure open public environments.

Private Sector Provides Recommendations on Preparedness Standards

- A group of private-sector associations, including ASIS International, have issued a report on security standards being mandated by the Department of Homeland Security.

Youth Violence

- After reviewing over 600 youth violence prevention programs, the University of Colorado’s Center for the Study and Prevention of Violence has chosen the 11 best.

Browser breakers

- The growing popularity of attacks against Web-browser software is evident in new research conducted by CompTIA, the Computing Technology Industry Association. The survey found that 36.8 percent of the nearly 900 organizations interviewed had seen browser-based attacks jump 25 percent from the previous year. Browser-based attacks are those that take place when a Web page contains malicious code that can compromise a Web browser. @ More information on the CompTIA survey is at SM Online.

Quick Bytes: Browser breakers.

- The growing popularity of attacks against Web-browser software is evident in new research conducted by CompTIA, the Computing Technology Industry Association. The survey found that 36.8 percent of the nearly 900 organizations interviewed had seen browser-based attacks jump 25 percent from the previous year. Browser-based attacks are those that take place when a Web page contains malicious code that can compromise a Web browser. @ More information on the CompTIA survey is at SM Online.

A High-Tech R&D Agenda

- A Dartmouth College think tank, the Institute for Security Technology Studies (ISTS), released the third of three reports that analyze and prioritize the technology needs of cyberattack investigators. Read the full report.

Massive Waste at DHS, Says Report

- A new report from a private watchdog group "details billions of dollars in waste and mismanagement of taxpayer dollars" at DHS.

Emergency Responders

- The Roman satirist Juvenal famously asked, "Who will guard the guardians?" An equally pertinent question for today might be "Who will respond to the emergency responders?"

9-11 Monographs Available

- Despite its bulk, the final report of the 9-11 Commission couldn't cover everything. Two topics, terrorist financing and travel, receive detailed treatment in a pair of monographs released by the commission. One document explains how the 9-11 plot was funded and assesses efforts to disrupt the flow of terrorist money. The other notes that "border inspectors today still do not have basic intelligence and operational training to aid them in detecting and preventing terrorist entry...." @ SM Online has the monographs.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.