Site Map - IT Security

Americans Report Sharp Rise in Internet Security Concerns

- Americans’ concern over Internet security has increased significantly in recent months, according to a biannual survey conducted by Unisys.

New NSA Report Details Home Computer Security Best Practices

- Home computer networks can be particularly vulnerable to attack, according to a new National Security Agency (NSA) report, since security practices can be less rigorous.

Security Is a Low Priority for Cloud Service Vendors, Study Finds

- Security is a relatively low priority for many cloud service providers, according to a new study conducted by the Ponemon Institute.


- 28 The percent drop in the number of fraud victims last year, compared to 2009, according to a Javelin Strategy and Research report. Victims fell to about eight  million, down three million from the year before. But out-of-pocket costs for those victimized rose significantly last year, according to Javelin, as criminals are shifting to more damaging, harder-to-detect attacks.

Survey Responders Say They Don't Have an Accurate Picture of IT Risk

- A new survey says there is still widespread misunderstanding of the impact user access reviews have on enterprise IT risk.

White House Releases Plan to Protect Identities and Grow Businesses Online

- The Obama administration today unveiled its strategy to safeguard transactions in cyberspace by helping to create voluntary "secure, efficient, easy-to-use, and interoperable identity solutions."

What Makes the Smart Grid Special, Makes it Vulnerable

- Despite its enormous benefits, many smart-grid critics see looming danger.

Laptop Tracking

- The inexpensive software program known as Prey can help locate missing or stolen laptops and other portable devices.  

Spam Plunges While Attacks Rise

- A new report finds that e-mail spam decreased by half last year, while search engine malware and Twitter crime rates skyrocketed.

Laptop Tracking

- An inexpensive software program can help locate missing or stolen laptops and other portable devices.  

Laptop Security

- Depending on the industry they work in, employees have a 5 to 10 percent chance of losing their laptop or having it stolen over a three-year period, according to a new study. Most missing devices do not use basic security measures such as encryption.

Hacking the Human: Social Engineering Techniques and Security Countermeasures

- Hacking the Human argues persuasively that human security is the missing link between IT security and physical security.

WikiLeaks' Information-Sharing Fallout

- The leak of classified U.S. State Department cables may lead to a clampdown on information sharing among government agencies.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.