Site Map - IT

Password frustration

- How many passwords do you need to remember? A survey by RSA Security Inc. of 1,700 enterprise technology end users found that 71 percent had as many as 12, and almost one-quarter had more than 15. To keep track of these, the majority of users said that they keep a record on a PDA or a document on their PC; 19 percent keep a note attached to their computer or have another type of paper record in their office. @ More details of the RSA's security survey are at SM online.

A Site to See

- Web-page bookmarks are a great way to keep track of your own frequently traveled Web sites. But how can you find out what sites are most popular with other people? “Social bookmark” sites allow anyone who stumbles across an interesting site to immediately bookmark it and then post it to a central Web site to encourage others to visit it as well. One of the most prominent of these sites is, which posts hundreds of bookmarks each day. Posters can add comments to their bookmarks and categorize them under any number of different tags, including security, software, and hacks, that allow other users to search for new sites in specific categories. The site also provides a location for saving personal bookmarks that can be accessed from any computer so that if you’re on the road and want to visit a bookmarked page but don’t have your regular computer, you can find the links easily nonetheless. Best of all, the site is completely free.Social bookmarking is a great way to find new sites in any category of interest to you, and that makes A Site to See. @ Get there via SM Online.

Intrusion Prevention Fundamentals: An Introduction to Network Attack Mitigation with IPS

- The principal benefit of the book might be its good organization. Intrusion prevention is introduced in the first part, followed by an explanation of the two levels of intrusion prevention in Part Two. The final part of the book is devoted to sample deployment solutions.

Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures

- New tomes on executive protection, homeland security, and the rise of private military companies in the post-9-11 world draw rave reviews.

@ Worth a Look

- Each time a laptop is stolen from a public- or private-sector employee, there is a hue and cry about whether it was encrypted or password protected or otherwise had its data secure from prying eyes. These high-tech solutions sometimes overshadow the low-tech equipment that could have prevented the theft in the first place.

New in Plaintext

- True to the title, this book is easy to understand, and the projects are easy to follow. They range from customizing the desktop panel with shortcuts to installing and running new applications. There’s even a chapter on learning to use the dreaded Terminal.

Security Goes to School

- New rules for the discovery of electronic evidence go into effect this month. Also, a range of laptop locks, and a study of data theft from higher-education institutions.

Top 10 Performing Security Stocks for November 2006

- Top 10 Performing Security Stocks for November 2006

Outbound Data

- Iowa State University conducted a survey and found that only 30 percent of companies monitor the content of outbound e-mails. See further findings online.

Security Controls

- Computer security in government needs help, and NIST has stepped up to the plate with Recommended Security Controls for Federal Information Systems.

A Look at Laptop Theft

- Twenty-nine percent of all stolen laptops are taken from offices, with thefts from cars responsible for another 25 percent of laptop losses, according to survey data from CREDANT Technologies, a security software provider. Some of the 283 executives who responded to the survey noted that office laptops had been stolen despite being locked or even glued to desktops.  

Terror on the Internet: The New Arena, The New Challenges

- Gabriel Weimann, professor of communications at Haifa University in Israel, has produced a disturbing analysis of the extraordinarily popular use of the Internet by violent extremist organizations seeking a global forum.

A Site to See

- If you’re interested to know just how much information about your organization is out there on the Web, you might want to start by taking a look at the history of the company’s Web site. You may not realize it, but most Web pages have been saved on the Internet Archive Wayback Machine (which has archived 55 billion pages since 1996), divided by year and month, and in some cases by the day.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.