INFORMATION

Site Map - Cybersecurity

Continuity Program Buy-in

- Those charged with continuity planning can get support from senior management by developing metrics and demonstrating value to the bottom line.

CHART: Mobile Device Security

- How organizations are securing mobile devices.

Study Highlights Infrastructure Risks

- A biennial report that looks at how well various industries manage risk and guard against cyberattacks has found that critical infrastructure, including the energy and utilities sectors, is among the lowest ranked of the group.

Screen Scraping Security

- Companies that use scanning tools to search for data must be careful to avoid violating privacy laws.

CHART: Cyber-Risk Control Practices of Top Management

- How boards & senior executives are managing cyber risks.

Encryption Critical in Healthcare

- Encryption technology, as well as security protocols and safeguards, are crucial to protecting patient data and complying with regulatory standards.

Developing a Cybersecurity Staff

- The federal government can improve its cybersecurity capabilities through more targeted hiring and training of a cybersecurity work force, but that’s easier said than done.

Consolidating Authorization

- Helping companies consolidate the network access and authentication process.

Social Networking Sites Assist Investigations

- As more investigators use social media, they need to be aware of the legal issues and tread carefully.

CHART: Types of Data Breaches

- Criminals target strikingly different types of data in large and small organizations.

CHART: How Companies Respond to Data Breaches

-

Worth a Look: iSpy

- Associate Editor John Wagley reviews an inexpensive surveillance application with a breadth of features and controls.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.