INFORMATION

Site Map - Cybersecurity

Breach of Faith, Loss of Dollars

-

A Look at Laptop Theft

-

The Growing Trend Toward Convergence

- The survey was conducted by Booz Allen Hamilton (BAH) for ASIS International, the Information Systems Security Association, and the Information Systems Audit and Control Association.

The Many Faces of Malware

- In the past, cyberthreats fit into discrete categories, such as being virus or phishing. Today, lines are blurred and malware is multifaceted and multiplying, creating a challenge for companies trying to defend against such threats.

Behind the Numbers: A Surge in Phishing Attacks

-

Quick Bytes: Cyberwar Risk

- China has established information warfare units to develop viruses to attack enemy computer systems and networks, according to a recent Defense Department (DoD) report. Other countries, including the United States, are developing similar capabilities.

Numbers

- 85 The percentage of organizations reporting that they have experienced a data breach event, according to a study by the Ponemon Institute.

Checking IT Backgrounds

- As employee background checks become more prevalent, many experts are urging companies to pay particular attention to their IT staff.

In Privacy We Trust

- A data breach can badly bruise a company’s reputation. But when companies work hard to convince their customers that their private information is protected, it can be a boon to customer loyalty and a firm’s bottom line.

Sizing Up Enterprise Rights Management

- After an incident several years ago in which a manager sold some of the company’s intellectual property to a competitor, the executive search firm Sterling-Hoffman did some brainstorming on ways to fortify its data protection. The company, based in Mountain View, California, decided to go with a software solution that would secure the data no matter the format or storage location.

Waive Goodbye to Liability

- Penetration testing of a computer network requires careful planning and limits on the scope of work.

Tips for Tracking the E-Mail Trail

- Investigating the origin of e-mail to catch criminals requires a special set of detective skills and tools.  

Quick Bytes: ID Theft Rising

- About 15 million Americans fell victim to some form of identity theft in the 12 months ending in mid-2006, an increase of more than 50 percent since 2003. For the rest of the Garner survey, click here.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.