INFORMATION

Site Map - IT Security

Morning Security Brief: Drug Testing, The Real IRA, FBI Official Wants a New Internet, and More

- Drug testing for welfare recipients ruled unconstitutional. The Real IRA says its starting a campaign against "economic targets." An FBI official calls for a new Internet. And more.

Most Popular Spam Topics: Pharmaceuticals and Dating

- One in 1.35 emails is spam according to Symantec. The most common categories of spam in October were pharmaceuticals and dating -- and sometimes a mix of the two.

The Cybersecurity Field Is Growing, But Its Diversity Isn't

- Just two years ago, the unemployment rate among IT professionals was approaching 9 percent. Despite virtually '0' unemployment now, women, African Americans, and Latinos are underrepresented.

Behind The Numbers

- Types of Data on Lost or Stolen Mobile Devices

Manulife Outsources VM Scanning

- A financial services company found a cloud-based service that could help scan its network for weaknesses.

Avoiding the Spearphisher's Barb

- Cyberthieves know just how to target big executive fish and fool them into helping steal proprietary data through the network.

Manulife Outsources VM Scanning

- A financial services company found a cloud-based service that could help scan its network for weaknesses.

Social Media

- An employee who used the Internet for personal reasons on company time is not guilty of violating the Computer Fraud and Abuse Act (CFAA), according to a federal court. The district court ruled that the CFAA was designed to target hackers and does not apply to employees who use company computers for personal reasons.

The Lure of Spearphishing

- Take a look at the numbers behind a typical spearphishing campaign.

Bolstering Security Education

- Many security managers say end-user education is a central part of IT security. More regulations are also requiring that organizations demonstrate that they’re conducting such training.

Bolstering Security Education

- Many security managers say end-user education is a central part of IT security. More regulations are also requiring that organizations demonstrate that they’re conducting such training.

Breach Insurance Gains Steam

- Companies can mitigate losses from cyberattacks and other data breaches by purchasing cyber insurance, but they should evaluate policies carefully.

A Stuxnet-Type Hack Could Disable Prison Security Systems

- Exploiting a vulnerability in programmable logic controllers, hackers could wreak havoc on prison lights, doors, and video surveillance.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.