INFORMATION

Site Map - IT Security

Enhancing Computer Security with Smart Technology

- The goal of the book is to show how to use “smart technology” (which, regrettably, the authors never define) to enhance computer security.

DHS Computers Hacked

- Dozens of computers compromised.

Encrypting data at rest

- Pressure to comply with regulatory efforts such as Sarbanes-Oxley and Gramm-Leach-Bliley is the key driver of enterprisewide encryption efforts, according to security professionals at 112 financial services companies surveyed by InfoTech, yet just over half of those surveyed said that encryption of data at rest is “a high priority for their organizations.”

Anti-Spam Toolkit

- The book is ideal for system administrators tasked with evaluating antispam products for their organizations, but there is something for every level of user.

Numbers

- 5 Maximum percentage of IT budget spent on security by the average U.K.-based company, according to a survey of information security breaches by PricewaterhouseCoopers.

Quick Bytes: Unsafe workers.

- Seventeen percent of employees have launched a hacking tool or keystroke-logging software on their network in the past year, an increase from 12 percent from the year before. That’s no surprise given that 47 percent of the 351 IT decision-makers interviewed by Websense said employees who received phishing e-mails clicked on the link they found in the message, while a third of those interviewed admitted that they don’t block executables in e-mails. The annual Web@Work survey interviewed 351 information technology managers from U.S. companies of all sizes. @ More results of the survey are at SM Online.

Quick Bytes: Cybersecurity framework

- The National Science and Technology Council has released the Federal Plan for Cyber Security and Information Assurance Research and Development. The plan provides “baseline information and a technical framework for coordinated multiagency R&D in cyber security and information assurance.” It covers vulnerabilities, threats, and risk, and provides technical perspectives on subjects ranging from authentication and access control to wireless to software testing and assessment tools. An appendix provides roles and responsibilities of the members of the working group that created the report.@ The Report is at SM Online.

Quick Bytes: Cybersecurity framework

- The National Science and Technology Council has released the Federal Plan for Cyber Security and Information Assurance Research and Development. The plan provides “baseline information and a technical framework for coordinated multiagency R&D in cyber security and information assurance.” It covers vulnerabilities, threats, and risk, and provides technical perspectives on subjects ranging from authentication and access control to wireless to software testing and assessment tools. An appendix provides roles and responsibilities of the members of the working group that created the report.@ The Report is at SM Online.

Growing Threat to Online Applications

- Wireless continuity between access points, Web 2.0 under increasing attack, local weather updates, and more

Cell Networks Evolve Into Data Networks

- Wireless continuity between access points, Web 2.0 under increasing attack, local weather updates, and more

Software Threats

- The annual Web@Work survey finds that employees launch hacking tool software on their network when clicking on nefarious links.

Protect Your Windows Network: From Perimeter to Data

- The distinctive nature of Protect Your Windows Network : From Perimeter to Data is that it suggest ways to secure your Windows workstation and network, but it also takes a much broader approach to security and shows you how to address the issue of securing systems as a whole. This panoptic approach to securing systems is quite refreshing, and it makes the book a fascinating read.

Mapping Security: The Corporate Security Sourcebook for Today’s Global Economy

- In Mapping Security: The Corporate Security Sourcebook for Today’s Global Economy, authors Tom Patterson and Scott Gleeson Blue offer a holistic view of what today’s chief security officers must consider when protecting corporate interests during partnerships with foreign companies.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.