Site Map - IT

Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures

- New tomes on executive protection, homeland security, and the rise of private military companies in the post-9-11 world draw rave reviews.

@ Worth a Look

- Each time a laptop is stolen from a public- or private-sector employee, there is a hue and cry about whether it was encrypted or password protected or otherwise had its data secure from prying eyes. These high-tech solutions sometimes overshadow the low-tech equipment that could have prevented the theft in the first place.

New in Plaintext

- True to the title, this book is easy to understand, and the projects are easy to follow. They range from customizing the desktop panel with shortcuts to installing and running new applications. There’s even a chapter on learning to use the dreaded Terminal.

Security Goes to School

- New rules for the discovery of electronic evidence go into effect this month. Also, a range of laptop locks, and a study of data theft from higher-education institutions.

Top 10 Performing Security Stocks for November 2006

- Top 10 Performing Security Stocks for November 2006

Outbound Data

- Iowa State University conducted a survey and found that only 30 percent of companies monitor the content of outbound e-mails. See further findings online.

Security Controls

- Computer security in government needs help, and NIST has stepped up to the plate with Recommended Security Controls for Federal Information Systems.

A Look at Laptop Theft

- Twenty-nine percent of all stolen laptops are taken from offices, with thefts from cars responsible for another 25 percent of laptop losses, according to survey data from CREDANT Technologies, a security software provider. Some of the 283 executives who responded to the survey noted that office laptops had been stolen despite being locked or even glued to desktops.  

Terror on the Internet: The New Arena, The New Challenges

- Gabriel Weimann, professor of communications at Haifa University in Israel, has produced a disturbing analysis of the extraordinarily popular use of the Internet by violent extremist organizations seeking a global forum.

A Site to See

- If you’re interested to know just how much information about your organization is out there on the Web, you might want to start by taking a look at the history of the company’s Web site. You may not realize it, but most Web pages have been saved on the Internet Archive Wayback Machine (which has archived 55 billion pages since 1996), divided by year and month, and in some cases by the day.

New in Plaintext

- Browse the bookstore for a beginner’s text on computers and it’s easy to come away feeling digitally inadequate. Titles that refer to the reader as a “dummy” or worse seem to be the only ones that, with wit and easy-to-understand language, can make technology accessible to the average reader.

Quick Bytes: Educating home users

- It’s commonplace for workers to use home computers to connect to corporate networks, but it’s no secret that these computers are an easy target for attackers, thus jeopardizing corporate networks as well. Stepping in to help is the National Institute of Standards and Technology (NIST), which has released a series of recommendations aimed at users of Windows XP Home Edition.

Quick Bytes: Text on Net annoyances

- Need to know everything there is to know about Web-based dangers and annoyances? Looking for a one-stop shop for the tips and tools that will prevent spam from hitting your computer or spyware from taking it over? Point your browser to a free online text by Dan Sullivan called The Definitive Guide to Controlling Malware, Spyware, Phishing, and Spam.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.