Site Map - IT

CHART: Behind The Numbers

- Security tools lag behind security policies.

Creating a Digital Evidence Policy

- Now that most court cases involve digital evidence analysis, companies should develop a policy on retaining such documents.

Federal Cybersecurity Perspective: Interview with Laura Mather, Ph.D.

- An interview with Dr. Laura Mather, cofounder and chief visionary of Silver Tail Systems.  

Thor’s Microsoft Security Bible

- This book presents a fascinating collection of practical and immediately implementable Microsoft security techniques, processes, and meth­odologies uniquely illustrated through real-world process examples.

Medical Billing Company Says Employee Leaked Data to Identity Theft Ring

- Florida-based Advanced Data Processing, Inc. says an employee illegally accessed the ambulance billing system and leaked individual account information to a group suspected of filing fraudulent tax returns.

Morning Security Brief: Syria Disconnected, Parastoo Speaks, Pan-Arab Security Conference, and More

- Syria’s Internet is offline. The IAEA is targeted by a hacker called Parastoo. And the Pan-Arab security conference wraps up in Riyadh.

Surveillance System Technology Trends

- It’s getting easier to have surveillance systems that don’t overwhelm the network or storage systems.

Morning Security Brief: Cyber Monday Safety, Bank Fined for Lack of Protection, Bangladesh Factory Fires, and More

- Staying safe on Cyber Monday. Britain fines a bank for failing to implement risk management practices that could have prevented billions of dollars worth of fraud. Police open a negligence investigation as protests begin in the wake of Bangladesh factory fires. And more.

Photos of Prince William Reveal 'Sensitive' Information and Login Credentials

- Tip: Don’t post network login details on the wall – especially if you’re working for the Ministry of Defence.

Has a Hacker Figured Out How to Hide Malicious Sites Inside Search Results?

- Websense threat researchers think a Chinese hacker may have found a way to exploit Google’s convenient optical character recognition to make malicious urls more visible in Google search results.

Michigan Man Charged with Selling Fake Microsoft Software

- A Michigan man was arraigned last week in the U.S. District Court for the Eastern District of Michigan on charges of mail fraud and selling counterfeit Microsoft software worth more than $1.2 million, according to the Department of Justice.

Two Members of Film Piracy Group Sentenced

- Two members of an Internet piracy group have been sentenced in Virginia for illegally copying and distributing first-run films.

Hacking Tools Fuel Russian Black Market

- By monitoring Russian hacker forums, a cloud security company’s threat researchers found that Russia’s cyber black market is thriving on sales of the same hacking tools that the FBI says hackers have used to cause millions of dollars’ worth of damage.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.