Site Map - Cybersecurity

Social Networking Sites Assist Investigations

- As more investigators use social media, they need to be aware of the legal issues and tread carefully.

CHART: Types of Data Breaches

- Criminals target strikingly different types of data in large and small organizations.

CHART: How Companies Respond to Data Breaches


Worth a Look: iSpy

- Associate Editor John Wagley reviews an inexpensive surveillance application with a breadth of features and controls.

Social Networking Security

- Increasingly, employees expect to remain connected to social networking sites while at work. But these sites represent a growing threat.

Dial “O” for an Open Door

- While a new technology that could turn smartphones into access control devices looks promising, a recent pilot program reveals complications.

Behind the Numbers

- The ramifications of cyberattacks.  

CHART: How Companies Protect Sensitive Information

- Steps companies are taking to protect data.  

Worth a Look: iHound

- An inexpensive application for tracking Apple and Android devices.

Can ISPs Help Beat Botnets?

- To fight hackers, companies are informing customers of threats, creating public-private partnerships, and devising security standards.

Worth a Look: CamCam

- A new application called CamCam, offers a good balance of quality, ease of use, and cost for someone who wants a limited home surveillance option.

Firms Flock to Managed Services

- Before organizations contract with managed security services providers, they should clarify their needs and expectations.

Ranking of Cloud Security Measures

-  Survey data from the Ponemon Institute shows what cloud security measures respondents thought were most important.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.