Site Map - Cybersecurity

Reclaiming Reputations

- Have a bad reputation on the Web? A new service may be able to help companies and individuals reclaim their reputations.

Emphasizing App Security

- Even though the majority of network vulnerabilities occur in applications, organizations are far more likely to focus time and money on operating system security.

Behind the Numbers

- Forrester Research lists the top five areas of security product innovation.


- 640   The number, in thousands, of new fake antivirus programs propagated during the year’s third quarter, according to PandaLabs.

Site to See: RUBotted

- This free Windows program uses intelligent monitoring to detect bot-like behavior.

Firewalls, IPS Lauded

- Firewalls and intrusion prevention systems rank as worthy of a security department's scarce resources, according to Forrester Research.

Aligning Security and Company Risk

- Instead of turning to technology to solve security problems, some companies are working to improve compliance with existing policies.

Behind the Numbers: Malicious Web Site Hosting Per Country


Site to See: NoScript

- Web surfers are at constant risk of attack from executable content such as Java and JavaScript. This browser add-on lets users block such content on all but a few trusted sites.  

Absence of Malware

- With malware on the rise, it's more important than ever for companies to find ways to detect, deter, and quarantine it. Some new solutions include Web filtering and security information and event management tools.

Site to See: NoScript

- The NoScript add-on can block cross-site scripting attacks.

Encryption Update

- As more companies implement an encryption strategy, a growing number are also choosing centrally managed, platform-based solutions, according to a recent annual study by the Ponemon Institute and PGP Corp.

Cold Cases and "Social Search"

- A private investigator hopes social networking and other online search tools will help him solve a "cold case" he's on.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.