Site Map - Cybersecurity

Credit Card Data Security Problems

- The technical requirements built into the standard for credit card data security are sound, but the oversight process is lacking, say critics.


- Everyone cares about computer security but for stalking victims, it carries special significance. The Safety Net Project provides tips and other resources to help victims use technology strategically to find safety and escape abuse.  

Creating a No-Phishing Zone

- As phishing e-mails become more targeted and harder to stop, organizations are developing new countermeasures to reduce the threat.


- 430 The percentage increase in targeted Trojan horses sent to company executives via e-mail in 2008 compared to 2007. The number of attacks jumped from about 10 per day to about 53, according to MessageLabs Intelligence: 2008 Annual Security Report, published by parent company Symantec.

Quick Bytes: AV Check?

- The antivirus (AV) functionality is either disabled or missing in about 25 percent of PCs running AV software, according to the security vendor Promisec.

Quick Bytes: Cloak of Legitimacy

- Threats coming from legitimate Web sites were up 90 percent in 2008, according to Cisco Systems.

A Site to See: SpyBye

- Web sites unknowingly harbor malware, but SpyBye can help Web masters out them.

Fighting Scareware

- Beware of the coming scareware onslaught.

Federation in the Cloud

- Tying together multiple in-the-cloud services with a single-sign-on solution can be challenging, but one company has the solution.

It's All About Risk

- To ensure that information is protected, companies must make software and system security a priority at the outset of a project.

Behind the Numbers: Enterprise Attack Sophistication by Industry


Quick Bytes: Bad Education

- About one-third of data breaches occur in the educational sector, according to a study by Madison, Wisconsin-based J. Campana & Associates, yet the industry comprises less than 1 percent of total organizations.

A Site to See: PassPub

- Many people don’t secure their wireless router with a password. That could be a reason to visit PassPub, which can automatically generate passwords specifically tailored to the security protocols of wireless routers.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.