INFORMATION

Site Map - IT Security

Protect Your Windows Network: From Perimeter to Data

- The distinctive nature of Protect Your Windows Network : From Perimeter to Data is that it suggest ways to secure your Windows workstation and network, but it also takes a much broader approach to security and shows you how to address the issue of securing systems as a whole. This panoptic approach to securing systems is quite refreshing, and it makes the book a fascinating read.

Mapping Security: The Corporate Security Sourcebook for Today’s Global Economy

- In Mapping Security: The Corporate Security Sourcebook for Today’s Global Economy, authors Tom Patterson and Scott Gleeson Blue offer a holistic view of what today’s chief security officers must consider when protecting corporate interests during partnerships with foreign companies.

Numbers

- Number of daily cyberattacks launched against credit unions

Cybersecurity Checklist for Business Managers

- John Bumgarner, research director for security technology with the US-CCU, says that the idea for the checklist evolved because, despite the number of industry-specific guidances (such as Sarbanes-Oxley and ISO standards), there was nothing aimed at nontechnical managers.

Worth a Look: Computer on a Stick

- COS is a USB token with an entire Linux operating system on it as well as a host of handy applications, including an e-mail client, the Firefox Web browser, and a PDF creator and viewer.

To Encrypt or Not to Encrypt? That is the Question

- Do financial services firms have to encrypt customer data? Also, a computer on a stick, and a cybersecurity checklist for business managers.

Security Breaches More Severe

- Although the number of organizations hit by security breaches has decreased, the severity of the breaches has shown a marked increase.

A Site To See

- If you are a wireless user, you need to know just how many tools are available to compromise wireless networks. Remote-exploit.org highlights tools such as Hotspotter, which acts like a wireless hotspot so that anyone trying to connect to a legitimate network at, say, Starbucks will attach to the attacker’s access point instead. The tools can be downloaded from the Web site along with detailed tutorials—in some cases, step-by-step Flash presentations that walk users through programs that break wireless encryption protocols or that can crack passwords. The need for information on how wireless networks can be vulnerable makes Remote-exploit.org A Site to See. @ Get there via SM Online.

Cybersecurity Checklist

- The United States Cyber Consequences Unit released a checklist to help business managers assess their companies’ cybersecurity.

Hacking Wireless Networks for Dummies

-

Worth a Look: Portable Data Safes

- Software that’s built into the drive provides encryption, an e-wallet function for storing credit card numbers, and single sign-on to applications and Web sites. Data is encrypted using 256-bit AES encryption. A 4-to-40-character password is optional.

Old E-Mail Worms Never Die

- Security and outsourcing, cell-phone risk, e-mail worms, and what’s new in secure portable data devices.

Has Cybercrime Surpassed Physical Crime?

- Cybercrime versus physical crime, antiterror advice, cargo security, and rail security.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.