INFORMATION

Site Map - IT

Where Copyright Meets the Internet

- Copyright infringement on the Internet, planning for floods, space security, and stale-dated check fraud.(

Security's Input on Outsourcing

- Security can play a valuable role in corporate outsourcing efforts.

Sizing Up IP

- What issues are raised when security wants to install an IP-based CCTV system? We asked security and IT professionals for their thoughts, and found only a few areas of concern.

Executive Roadmap to Fraud Prevention and Internal Control: Creating a Culture of Compliance.

- The book features the authors’ view of the interplay among fraud specialists, corporate security professionals, and IT security practitioners. Clearly favored are the fraud specialists.

Enhancing Computer Security with Smart Technology

- The goal of the book is to show how to use “smart technology” (which, regrettably, the authors never define) to enhance computer security.

DHS Computers Hacked

- Dozens of computers compromised.

Quick Bytes: Encrypting data at rest

- Pressure to comply with regulatory efforts such as Sarbanes-Oxley and Gramm-Leach-Bliley is the key driver of enterprisewide encryption efforts, according to security professionals at 112 financial services companies surveyed by InfoTech, yet just over half of those surveyed said that encryption of data at rest is “a high priority for their organizations.” Less than a third said they think their firms are doing “an adequate job of encrypting data at rest.” Fifty-seven percent plan new encryption efforts in the near future. @ More results from Enterprise Encryption in the Financial Services Sector are available at SM Online.

Laptop Lessons Learned?

- Who’s responsible for restoring the Web after disruption? Also, advice on laptop security, a book on corporate blogs, and slow compliance with the PCI data security standard.

Who Owns the Net?

- Who’s responsible for restoring the Web after disruption? Also, advice on laptop security, a book on corporate blogs, and slow compliance with the PCI data security standard.

Who Owns the Net?

- The Business Roundtable recommends that the private sector take responsibility for fixing weaknesses in key Internet assets.

Security and Usability: Designing Secure Systems That People Can Use

- The six major parts of the book all have their enlightening moments, whether discussing authentication mechanisms or privacy and anonymity.

Anti-Spam Toolkit

- The book is ideal for system administrators tasked with evaluating antispam products for their organizations, but there is something for every level of user.

New in Plaintext

- The book is best browsed through in front of a computer, because you’ll be eagerly visiting the Web sites he writes about and trying the software and tactics he describes. Many of the latter I had never heard of. For instance, in a chapter on how to work around censorship (government or corporate) of Web sites, he describes how to access banned Web pages by having them e-mailed to you. No special software is required; just send an e-mail containing the URL of the Web site you want to see to a certain e-mail address, and the full site will be sent back to you inside a return message.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.