INFORMATION

Site Map - Cybersecurity

A New Perspective on Protecting Personal Data

- While the ability to access databases from anywhere via the Internet enhances everyone’s efficiency, it also raises the risk that personal and proprietary information will fall into the wrong hands.

A Site to See

- Hak.5 calls itself “a television show for geeks, hackers, and do-it-yourselfers” that is distributed online in short YouTube segments. Find out more about the exploits that are coming your way by visiting Hak.5., this month’s Site to See.

Painful Disclosures

- The average stock prices of six companies that had disclosed an information security breach between February 2005 and June 2006 fell by five percent within a month of the disclosure and remained as much as 8.5 percent below predisclosure levels for nearly a year.

A Site to See

- This month's site to see takes you to Google's new purchase, YouTube.

Faking Fingerprints and Eying Solutions

- With biometrics like fingerprints and iris scans eyed for use in government-issued IDs such as passports, efforts to assess their ability to discern faked images are underway.

Worth a Look

- USB drives have been born again, thanks to a new technology platform.

A Site to See

- A television show for geeks.

Painful Disclosures

- The average stock prices of six companies that had disclosed an information security breach between February 2005 and June 2006 fell by five percent within a month of the disclosure.

Convergence: Smart Cards Versus Biometrics

- The convergence of biometrics and smart cards.

The ABCs of USB

- The ABC's of USB flash drives.

Quick Bytes - Confiscated Laptops

- When you arrive at or leave from a U.S. airport, Customs officials can search and seize your laptop and any electronic media you have.

Numbers

- 100 The number, in millions, of records containing personal information reported compromised between February 2005 and December 2006, according to the Privacy Rights Clearinghouse.

Barriers to Better IT Security

- What prevents IT professionals from setting up the best possible security programs?
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.