INFORMATION

Site Map - Cybersecurity

Energy Insecurities: The Downside of Being Too Smart

- The energy sector's cybervulnerabilities have become more challenging with the rise of smart technologies, but government and industry have not taken the necessary steps to address these exposures and secure America's energy infrastructure. (Online Exclusive)

Numbers

- 45 The percentage of IT professionals who say the risks of cloud computing outweigh the benefits, according to a study by ISACA, a nonprofit IT governance organization.

Medical Fraud's Rising Cost

- Although still a relatively small percentage of identity theft cases, medical identity fraud is particulary expensive. Worse, it's the only kind of ID theft that could kill.

Companies Push for Digital Privacy

- Consumer advocates and businesses urge the government to strengthen electronic privacy laws and limit law enforcement access to remotely stored data.

Behind the Numbers

- Chart: Information that IT deems too risky for cloud computing.

Behind the Numbers

- Top enterprise security risks according to IT managers.

Numbers

- 26 The percentage of U.K. school children who admitted to hacking into another person’s Facebook or e-mail accounts, according to a survey by Tufin Technologies. The reason most often given for the unauthorized access was for “fun and mischief.” Seventy-eight percent of respondents, however, said they felt the hacking was “wrong.”  

Stronger Healthcare Consent

- Better consumer education about the privacy of health data and research on sharing policies could help protect patient information.

Behind the Numbers

- Forrester Research finds out why companies adopt identity and access management solutions.

Quick Bytes

- Executives fear voice interception of employees.

Worth a Look: Facing Password Insecurity

- KeyLemon brings facial recognition software to computer security.

Reining in Data Collection

- As Web companies continue to gather information on consumers for marketing and research purposes, privacy considerations remain a serious concern.

Two Tools to Hold Off Hackers

- Firewall management and network behavior analysis are two applications helping companies secure the network.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.