INFORMATION

Site Map - IT Security

Case Study

- Learn about a software solution that helped one bank catch malware and save staff time previously spent on scanning PCs manually.

Countering the Persistent Threat

- A growing and nefarious cyberattack category, called advanced persistent threats, is a major concern for both governments and private enterprises that want to prevent their proprietary information from being stolen or damaged.

Virtually at Work

- A virtual desktop environment can help companies securely manage “bring your own device” policies by controlling access to corporate information.

Cyberattack Trends in Latin America

- Find out about malware trends and other cybersecurity issues facing Latin America.

NIST Releases Preliminary Cybersecurity Framework

- The National Institute of Standards and Technology (NIST) released a preliminary version of its cybersecurity framework on Wednesday.

Amtel Mobile Device Management

- It’s a given that Bring Your Own Device policies have become a security challenge that enterprises must grapple with. Companies are turning to mobile device management (MDM) solutions to control the wealth of gadgets living on their networks.

Choosing the Right Cloud Computing Model

- Whether it is better to house data in a public or private cloud depends on a company’s security and compliance needs as well as its risk tolerance.

Cloud Technology

- Companies are increasingly turning to cloud-computing technology to manage their informational assets. This 2013 study by IDG Enterprise looks at facts and figures behind the types of cloud services businesses are choosing.  

Computing in the Cloud

- Whether it is better to house data in a public or private cloud depends on a company’s security and compliance needs as well as its risk tolerance.

Morning Security Brief: Syria Says It Will Relinquish Chemical Weapons, Tech Companies File Suits with FISA Court, And More

- Syria's prime minister says his nation will accept a proposal to relinquish its chemical weapons stockpile to international control to avoid a military strike, France will bring a formal resolution to the U.N. security council on the proposal, more technology companies file suits with FISA for more details on its secret spying program, and more.

Morning Security Brief: U.S. Border Patrol Improves Training, Syrian Hackers Attack NYT, and More

- The GAO reports that the CBP has improved officer training and management. The New York Times and Twitter were hacked by the Syrian Electronic Army. Plus India captures key terrorist.

Remote Access

- A report on Web security finds that the greater the number of workers allowed to access a network remotely, the greater the chance of a network breach. Read the full report.

Forensics

- The Cloud Security Alliance has created a new working group to focus on the examination of incident handling and forensics in the cloud environment. In its first white paper, Mapping the Forensic Standard ISO/IEC 27037 to Cloud Computing, the group aims to help practitioners define standardized processes for conducting forensic investigations.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.