INFORMATION

Site Map - IT Security

Organizations Should Emphasize Basic Security Measures, According to Verizon Report

- Many organizations can better protect themselves from hackers by implementing more straightforward, basic security measures, according to a recently released annual report from Verizon.

Computer Security Handbook, Volumes 1 & 2, 5th Edition

- The Computer Security Handbook’s 77 comprehensive chapters, in two volumes, cover all 10 domains of the Common Body of Knowledge as defined by the International Information Systems Security Certification Consortium (ISC)2.

Privacy

- Law enforcement does not need a warrant to obtain the IP addresses for Twitter users, according to a recent decision. In investigating contributors to Wikileaks, the federal government asked Twitter to turn over the suspects’ account information. A U.S. district court ruled that the government does not need a warrant and that Twitter users have no expectations of privacy.

Morning Security Brief: Stratfor E-mails Leaked, Mobile Emergency Alerts, Anti-Drug Grants Used to Surveil Muslims, and More

- Wikileaks begins publishing "five million" Stratfor e-mails. The commercial mobile alert system is set to go live in April. NYPD used money to fight drug trafficking to purchase equipment used to surveil Muslims. And more.

Behind the Numbers

- The ramifications of cyberattacks.  

Expert: U.S. Must “Modernize” Cyber Defense Strategy

- Market-based incentives, rather than traditional regulations, may be more effective in countering cyber threats, according to one expert.

Can ISPs Help Beat Botnets?

- To fight hackers, companies are informing customers of threats, creating public-private partnerships, and devising security standards.

Data Security Regulations

- The U.S. Department of Homeland Security and the U.S. Commerce Department have asked for feedback on ways to create a “voluntary industry code of conduct” to combat botnets. Read the comments online.

Mobile Devices

- This relatively inexpensive application can help track Apple and Android mobile devices and also offers a host of additional security features.

The Pineapple Express: Hak5 Builds A Bigger, Better WiFi Honey Pot

- For convenience, wireless devices like laptops, tablets, and smartphones contain software that automatically connects to networks they remember. That feature is also an easy to exploit vulnerability.

Morning Security Brief: Ohio Gun Laws, Cyberstalking Survey Results, Honduras Dubbed the Murder Capital of the World, and More

- Patrons, bar owners at odds over new Ohio gun laws. One in five Americans has been stalked online, according to a new survey. Honduras has the world's highest murder rate. And more.

Worth a Look: iHound

- An inexpensive application for tracking Apple and Android devices.

Can ISPs Help Beat Botnets?

- To fight hackers, companies are informing customers of threats, creating public-private partnerships, and devising security standards.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.