Site Map - Cybersecurity

Worth a Look: Facing Password Insecurity

- KeyLemon brings facial recognition software to computer security.

Reining in Data Collection

- As Web companies continue to gather information on consumers for marketing and research purposes, privacy considerations remain a serious concern.

Two Tools to Hold Off Hackers

- Firewall management and network behavior analysis are two applications helping companies secure the network.

Behind the Numbers

- Pharmaceutical fraud dominated spam in the second half of 2009.

Quick Bytes: Security Budgets

- Security budgets will continue to grow in 2010 as spending on new security products recovers, according to a recent Forrester Research report.

Breaches Lead to Employee Training

- Firms grow wiser after a data breach, a new report finds.

The Rewards of PCI Compliance

- Small firms are less likely to be PCI compliant than larger organizations and are at a greater risk of data theft.

Behind the Numbers

- How the recession has hurt corporate IT security budgets.

Quick Bytes

- Online ID theft risk is overestimated. The problem lies more in the real world.


- 60 The percentage of enterprises that do not believe their existing security controls can adequately protect sensitive information on company databases. The survey, by Enterprise Strategy Group, polled 175 organizations with 1,000 or more employees.

Worth a Look: StrongWebmail

- Anyone seeking better e-mail security may want to check out a service called StrongWebmail.

Watch Your Business Partners

- Verizon’s annual data breach report warns that companies have one more weak link to worry about when protecting their information.

A Site to See: xB Browser

- This free open-source application combines Firefox with Tor to allow more anonymous browsing. 

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.