INFORMATION

Site Map - Cybersecurity

Security Goes to School

- New rules for the discovery of electronic evidence go into effect this month. Also, a range of laptop locks, and a study of data theft from higher-education institutions.

Discovery Rules of the Digital Age

- New rules for the discovery of electronic evidence go into effect this month. Also, a range of laptop locks, and a study of data theft from higher-education institutions.

Security Goes to School

- A third of higher-education institutions has experienced a data loss or theft—in particular grades and exam questions—in the last year, with nine percent reporting a loss or theft of student personal information, which could affect millions of university students.

A Look at Laptop Theft

- Twenty-nine percent of all stolen laptops are taken from offices, with thefts from cars responsible for another 25 percent of laptop losses, according to survey data from CREDANT Technologies, a security software provider. Some of the 283 executives who responded to the survey noted that office laptops had been stolen despite being locked or even glued to desktops.  

A Site to See

- If you’re interested to know just how much information about your organization is out there on the Web, you might want to start by taking a look at the history of the company’s Web site. You may not realize it, but most Web pages have been saved on the Internet Archive Wayback Machine (which has archived 55 billion pages since 1996), divided by year and month, and in some cases by the day.

New in Plaintext

- Browse the bookstore for a beginner’s text on computers and it’s easy to come away feeling digitally inadequate. Titles that refer to the reader as a “dummy” or worse seem to be the only ones that, with wit and easy-to-understand language, can make technology accessible to the average reader.

Quick Bytes: Educating home users

- It’s commonplace for workers to use home computers to connect to corporate networks, but it’s no secret that these computers are an easy target for attackers, thus jeopardizing corporate networks as well. Stepping in to help is the National Institute of Standards and Technology (NIST), which has released a series of recommendations aimed at users of Windows XP Home Edition.

Quick Bytes: Text on Net annoyances

- Need to know everything there is to know about Web-based dangers and annoyances? Looking for a one-stop shop for the tips and tools that will prevent spam from hitting your computer or spyware from taking it over? Point your browser to a free online text by Dan Sullivan called The Definitive Guide to Controlling Malware, Spyware, Phishing, and Spam.

Quick Bytes: The chemistry of security

- The American Chemistry Council’s Chemical Information Technology Council has released a guidance document “to educate and inform member companies, customers and the public” about cybersecurity concerns.

Security Convergence Roadmap Released

- The Open Security Exchange (OSE), a nonprofit association working with multiple industries to facilitate the convergence of physical and IT security, has created a roadmap that will help companies achieve the convergence of these functions; it is scheduled to be revealed this month.

Making Data Breaches Public

- When sensitive consumer information is stolen, the risk of identity theft rises. Many states have notification legislation; but, writes Michael Turner of the Information Policy Institute, federal rules are needed to prevent “patchwork responses.”

Financial Services Firms Under Siege

- The malicious side of social networking, financial firms under siege, and a new roadmap for security convergence.

Antisocial Networking Sites

- The malicious side of social networking, financial firms under siege, and a new roadmap for security convergence.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.