Site Map - IT Security


- An appeals court has ruled that an employee does not need to be aware of healthcare privacy laws to be guilty of violating them. The court determined that plaintiffs only needed to know that they obtained the identifiable health information of other people to be guilty of violating HIPAA.  

Case Study

- Carnegie Mellon University is thwarting phishing attacks with a software program that teaches members of the campus community how to spot suspicious e-mails.

How One University Enhanced Cybersecurity

- West Virginia University is strengthening its Web application security with a solution from IBM.

Continuity Program Buy-in

- Those charged with continuity planning can get support from senior management by developing metrics and demonstrating value to the bottom line.

CHART: Mobile Device Security

- How organizations are securing mobile devices.

Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Syste

- For those looking to get a handle on how to effectively secure critical infrastructure networks, Industrial Network Security is an excellent reference.

Google Algorithm Tweak to Punish Pirates

- Starting this week, Google may begin lowering the rank of Web sites appearing in its search results when the sites appear to be violating copyright laws.

Ransomware Holds Computers Hostage, Demands Payment

- Hackers are using a virus that disguises itself as a message from the FBI to extort money from computer users. The FBI is calling it “ransomware.”

Morning Security Brief: FBI Tattoo Database, West Nile Epidemic, Kaspersky Lab Discovers Gauss, and More

- The FBI biometric program is building a bigger tattoo database. State of Emergency declared for West Nile epidemic. Gauss wreaks havoc in Lebanese banks. And more.

Phishing E-mails Spoof Payroll Services

- In recent weeks, fraudulent e-mails purporting to be from payroll companies have aimed to lure recipients into downloading data-stealing malware onto their computers.

Study Highlights Infrastructure Risks

- A biennial report that looks at how well various industries manage risk and guard against cyberattacks has found that critical infrastructure, including the energy and utilities sectors, is among the lowest ranked of the group.

Network Monitoring Could Help Detect State-Sponsored Cyberattacks

- It is impossible to stop all attacks, but network monitoring can help make detection faster, experts say.

Two California Men Sentenced for ATM Fraud

- Two Southern California men were sentenced last week to 60 months each in prison for attempting to defraud nearly 1,000 debit and credit card holders by using stolen bank account information to withdraw money from ATMs.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.