INFORMATION

Site Map - Cybersecurity

Behind the Numbers

- Auction fraud has drastically fallen over six years while identity theft has slowly climbed, according to cybercrime complaints. -------------------------------------------------------------------------------

Laptop Tracking

- An inexpensive software program can help locate missing or stolen laptops and other portable devices.  

Behind the Numbers

- Only 23 percent of chief information security officers report directly to the CEO or the board of directors. -------------------------------------------------------------------------------

Numbers

- 86   The number, in thousands, of laptops missing or stolen in the past year from 329 organizations polled by the Ponemon Institute and Intel Corporation.

Worth a Look: VaporStream

- VaporStream takes message security to the next level for even the most privacy-conscious customer.

Data Breach Preparedness Plan

- An integral, but often overlooked, part of any corporate data security plan is caring for customers after an incident.

Cloud Security and Compliance Basics

- Understanding the types of services and security cloud computing providers offer is key to meeting compliance goals.

Behind the Numbers

- Compliance overtakes security concerns as the primary reason for encrypting data. -----------------------------------------------------------------------------  

Numbers

- 27 The percent of companies that suffered from data theft last year, according to the latest Kroll Global Fraud Report, which polled about 800 international executives.

Squelching Attacks with Splunk

- Splunk can help IT departments easily analyze patterns of potential threat activity.

Directing Privacy Policies at Consumers

- Companies need to make data privacy policies shorter and easier to understand, according to government representatives and industry experts.

Behind the Numbers

- Primary reasons companies aren't adopting pay-per-use hosting of virtual servers.

Behind the Numbers

- Forrester Research, Inc. asks what are the top IT priorities for small and mid-size businesses.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.