INFORMATION

Site Map - Cybersecurity

Encryption Update

- As more companies implement an encryption strategy, a growing number are also choosing centrally managed, platform-based solutions, according to a recent annual study by the Ponemon Institute and PGP Corp.

Cold Cases and "Social Search"

- A private investigator hopes social networking and other online search tools will help him solve a "cold case" he's on.

EU Balks at Employee Monitoring

- Companies that operate internationally must be aware of the stringent workplace privacy laws in the EU countries.

Behind the Numbers: Access Controls Used for High-Security Areas

- Access controls used for high-security areas.

A Site to See: TOSBack

- This Site to See notifies its subscribers when companies change their terms of service.

Cyber Stats High?

- Estimates on the size of the underground cybercrime economy may be inflated, according to a recent Microsoft report.

Quick Bytes: Mobile Risks

- Many employees are unaware of network security policies or intentionally try to evade them, according to a recent Ponemon Institute study.

Social Engineering Risks

- Cybercriminals' new tactic to steal valuable information preys on human nature.

Do Virtual Server Risks Outweigh Rewards?

- Many business managers fear that virtual servers are too vulnerable to attack, but technology is improving.

Data Security Through Deletion

- Instead of focusing on protection methods, one organization set out to limit the amount of sensitive data it collected.

Malware Attacks

- Malware attacks grew at a record pace in 2008 and are increasingly designed to steal personal information, such as passwords, according to the most recent Symantec Internet Security Threat Report. Most new infections stem from Web surfing.

Site to See: VIPRE Rescue Program

- Sometimes malware can render computers nearly or completely unoperational. It can shut down Windows system tools and security software. This free utility can be placed on a flash drive and used to rescue a crippled machine.

Behind the Numbers

- What data would IT employees steal if fired?
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.