INFORMATION

Site Map - IT Security

Spyware

- The bill would have prohibited intentionally copying a program onto a computer to commit a crime or to obtain or transmit personal information with the intent to defraud or injure another person or to cause damage to another’s computer.

Security Controls

- Computer security in government needs help, and NIST has stepped up to the plate with Recommended Security Controls for Federal Information Systems.

Quick Bytes: Educating home users

- It’s commonplace for workers to use home computers to connect to corporate networks, but it’s no secret that these computers are an easy target for attackers, thus jeopardizing corporate networks as well. Stepping in to help is the National Institute of Standards and Technology (NIST), which has released a series of recommendations aimed at users of Windows XP Home Edition.

Financial Services Firms Under Siege

- The malicious side of social networking, financial firms under siege, and a new roadmap for security convergence.

Antisocial Networking Sites

- The malicious side of social networking, financial firms under siege, and a new roadmap for security convergence.

Antisocial Networking Sites

- The next time you visit a Web site on which users contribute much of the content—say, social networking sites like Myspace or photo-sharing sites like Flickr—be aware that some of the content other users are contributing may be malicious.

Top 10 Performing Security Stocks for July 2006

- Top 10 Performing Security Stocks for July 2006

Enhancing Computer Security with Smart Technology

- The goal of the book is to show how to use “smart technology” (which, regrettably, the authors never define) to enhance computer security.

DHS Computers Hacked

- Dozens of computers compromised.

Encrypting data at rest

- Pressure to comply with regulatory efforts such as Sarbanes-Oxley and Gramm-Leach-Bliley is the key driver of enterprisewide encryption efforts, according to security professionals at 112 financial services companies surveyed by InfoTech, yet just over half of those surveyed said that encryption of data at rest is “a high priority for their organizations.”

Anti-Spam Toolkit

- The book is ideal for system administrators tasked with evaluating antispam products for their organizations, but there is something for every level of user.

Numbers

- 5 Maximum percentage of IT budget spent on security by the average U.K.-based company, according to a survey of information security breaches by PricewaterhouseCoopers.

Quick Bytes: Unsafe workers.

- Seventeen percent of employees have launched a hacking tool or keystroke-logging software on their network in the past year, an increase from 12 percent from the year before. That’s no surprise given that 47 percent of the 351 IT decision-makers interviewed by Websense said employees who received phishing e-mails clicked on the link they found in the message, while a third of those interviewed admitted that they don’t block executables in e-mails. The annual Web@Work survey interviewed 351 information technology managers from U.S. companies of all sizes. @ More results of the survey are at SM Online.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.