INFORMATION

Site Map - IT Security

Behind the Numbers

- Denial of service attacks by country of origin.

Defending Against DDoS Attacks

- Studies show that distributed denial of service attacks are on the rise, but there are ways to defend against them.

SSH Communications Security Makes Its Assessment Tool Available for Free

- SSH Communications Security, the company that invented the Secure Shell (SSH) protocol for data in transit, announced that it will be making its SSH Risk Assessor (SRA) tool freely available.

Trade Secrets

- A jury has found David Nosal guilty of trade secret theft, conspiracy, and violation of the Computer Fraud and Abuse Act (CFAA) after he used his employer’s confidential information to start his own business.

Morning Security Brief: Cybersecurity Improvements, CCTV vulnerability, Human Trafficking and ID Theft Raids

- Presidents Obama and Putin pledge to work together on cybersecurity. A researcher says that many CCTV cameras can be remotely attacked via the public Internet. More than a dozen convenience stores were raided as part of a massive human trafficking and identity theft investigation.

Data Breaches

- According to a recent survey of IT professionals conducted by the Ponemon Institute, insider fraud is on the rise, with data breaches being one of the most common threats. However, fewer than half of the companies surveyed say they are prepared to deal with the challenge. Read about those and other findings online.

Cisco Executive Discusses Evolving Perspectives on Cybersecurity

- Companies need to shift their focus in cybersecurity and vendors need to cooperate more, according to Bret Hartman, chief technology officer for Cisco’s Security Technology Group.

Behind the Numbers

- Top 5 Data-Protection Practices in Healthcare

Don’t Overdo Data Retention

- Experts urge companies to revisit their data retention policies to ensure that they are culling information archives effectively.

Monitoring Social Media Use

- More businesses are using social media to promote their brands, and that raises issues about when and how they should monitor what employees do with it.

Cybersecurity Framework Draft Efforts Underway

- Find out what’s happening with the cybersecurity framework.

New Trends in Cyber Threats

- For a few hundred dollars in start-up money and a few hundred more a month, anyone can buy the tools and services they need to build and run a malicious botnet. That's just one of the reasons the cyberlandscape is so hard to police.

Data Security

- According to a new study from the International Information Systems Security Certification Consortium, or (ISC)2, a shortage of security experts with strong leadership and communications skills poses a direct challenge to organizations around the world. The study includes feedback from more than 12,000 IT security professionals from across the globe.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.