Site Map - Cybersecurity

Police Embrace Social Media

- Police departments are finding that social media can be used to gather tips and feedback from the public.

The Cost of Cybercrime

- Take a look at the cost of cybercrime by type of attack.

Manulife Outsources VM Scanning

- A financial services company found a cloud-based service that could help scan its network for weaknesses.

Behind The Numbers

- Types of Data on Lost or Stolen Mobile Devices

The Lure of Spearphishing

- Behind the numbers of a typical spearphishing campaign.

Bolstering Security Education

- Many security managers say end-user education is a central part of IT security. More regulations are also requiring that organizations demonstrate that they’re conducting such training.

Breach Insurance Gains Steam

- Companies can mitigate losses from cyberattacks and other data breaches by purchasing cyber insurance, but they should evaluate policies carefully.

Top Ten Responses to Phishing Attacks

- A survey by AWPG examines the top 10 responses to phishing attacks.

Worth a Look: Send 2.0

- E-mail encryption solution, Send, from Send Technology, is both easy to use and free.

Moving Toward Trusted Identities

- In a new initiative designed to reduce online fraud and encourage commerce, the government turns to private industry for help.

Worth a Look: LastPass

- A free software helps make managing multiple password easier and more secure. -----------------------------------------------------------------------------------

Effective Privacy on a Tight Budget

- Privacy initiatives are often seen as a drain on resources, but program managers can change that by emphasizing common goals.

Behind the Numbers

- Forrester Research examines why employees are using unauthorized software at work.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.