INFORMATION

Site Map - IT

CHART: How Companies Protect Sensitive Information

- See the steps companies are taking to protect data.

Expert: U.S. Must “Modernize” Cyber Defense Strategy

- Market-based incentives, rather than traditional regulations, may be more effective in countering cyber threats, according to one expert.

Can ISPs Help Beat Botnets?

- To fight hackers, companies are informing customers of threats, creating public-private partnerships, and devising security standards.

Why Valentine’s Day Surveillance May Not Be a Good Idea

- Before you decide to track your spouse...

Researchers Monitoring the Emergence of Mobile Malware Built to Mine Location Data

- Security researchers are still trying to wrap their heads around what will come of an emerging trend in mobile malware that extracts a mobile user’s location data.

Cybersecurity

- A new law (formerly H.B. 665) establishes a cybersecurity task force within the Maryland state government. The task force is designed to evaluate mitigation and prevention strategies to prepare for a cyberattack. The task force will also conduct a review of existing policies, standards, and best practices within state agencies to identify inconsistences and devise new programs.

Data Security

- A new bill (S. 1535) that would impose data security requirements on companies that handle personally identifiable information has been approved by the Senate Judiciary Committee. The Senate has announced that it will consider the measure.

Data Security Regulations

- The U.S. Department of Homeland Security and the U.S. Commerce Department have asked for feedback on ways to create a “voluntary industry code of conduct” to combat botnets. Read the comments online.

Mobile Devices

- This relatively inexpensive application can help track Apple and Android mobile devices and also offers a host of additional security features.

The Pineapple Express: Hak5 Builds A Bigger, Better WiFi Honey Pot

- For convenience, wireless devices like laptops, tablets, and smartphones contain software that automatically connects to networks they remember. That feature is also an easy to exploit vulnerability.

Worth a Look: iHound

- An inexpensive application for tracking Apple and Android devices.

Can ISPs Help Beat Botnets?

- To fight hackers, companies are informing customers of threats, creating public-private partnerships, and devising security standards.

Securing the Smart Grid: Next Generation Power Grid Security

- Novices may find value in the thorough introduction to subjects such as the smart grid, hacking, and IT threats. It’s unlikely that the text would be a consistently helpful working reference, however, for those already engaged in smart grid security.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.