INFORMATION

Site Map - Cybersecurity

Cloud Security in the Air

- The lack of industry standards for cloud-based services should make users wary. But as the technology matures, new uses could provide value.

Security Budget Plunge

- About 44 percent of information security professionals with hiring responsibilities plan to add staff in the coming year, according to a survey by security industry organization ISC². In-demand areas of expertise include information risk management, operations security, and security architecture and models.

Behind the Numbers

- Adoption rates for IT security in small to medium-sized businesses.

Quick Bytes: Web of Complaints

- The number of complaints about Internet crime rose 33 percent in 2008 compared to 2007, with financial losses rising about 11 percent, according to a new report.

New VoIP Encryption Challenges

- Law enforcement officials worldwide have expressed frustration at their inability to tap encrypted VoIP communications and a new encryption product may add to it.

Collaboration Key to Protecting Data

- The credit card industry has established a new forum to allow confidential sharing of information on breaches and threats to data security.

Healthy Data Security

- Mobile devices can cut costs and improve healthcare, but they also dramatically increase the potential vulnerability of personal patient information. Learn how healthcare providers are adapting technological solutions to their needs.

Behind the Numbers

- The top Internet frauds complaints for 2008.

Site to See: Google Alerts

- Google Alerts can help people monitor the Internet for any of their personal information churning around cyberspace.

Quick Bytes: Lost Customers is Biggest Breach Cost

- The biggest data breach cost by far is loss of customer relationships, according to a Ponemon Institute study. Such losses account for 69 percent of breach costs, up from 65 percent in 2007 and 54 percent in 2006.

Gray Hat Hacking

- The Ethical Hacker's Handbook attempts to create antihacking security professionals: it more than succeeds in its task.

Security in Tough Times

- Companies will need to optimize interdepartmental budget sharing, share security-related tasks, and even outsource to keep a nimble security strategy during the current recession, a new report recommends.

Hardening Flash Drives

- Flash drives, while smaller and cheaper, are becoming one more weak security link in the computer environment.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.