Site Map - IT

More Compliance, Less Security

- Threats to your computer can range from gnatlike annoyances such as pop-up ads to the pointed hooks The Forsythe survey notes that 28 percent of the respondents had little or no confidence that they had detected all significant security breaches in the past year; even more alarming was that a similar number rated their current IT environment as more vulnerable than a year before. That, says John Kiser, CEO of Gray Hat Research Corporation, may be a sign that time or money spent by IT professionals on ensuring compliance to top management are resources taken away from other crucial security tasks.

What Are Your Weaknesses?

- The first step that a company can and should take along the road to better data security is to conduct a formal IT assessment.

New Threats

- Consumer Internet Threat Meter educates consumers on online risks.

Travel Tips

- Utimaco Software has listed Top Tips for Mobile Computing.

Data Losses

- RSA Security’s Wireless Security Survey of San Francisco found that more than 40 percent of wireless networks were unsecured.

P2P Dangers Growing

- More than doubling in three years, P2P use is an increasingly dangerous means of sending confidential information.

Tech Talk From Microsoft — How to Use the TechNet Security Center

- This is the first in a series of four pieces that will highlight resources available from Microsoft. ASIS International is partnering with Microsoft to help raise IT awareness among its security professional membership.

Essential Computer Security

- The Essential Computer Security: Everyone’s Guide to Email, Internet, and Wireless Security can serve as the owner’s manual for anyone serious about ensuring the security of their computer and the data contained therein.

Behind the Numbers: Image Spam Fades in 2007


Paying Up for Retail Privacy

- A study in which participants were given money to spend online found that they would pay more at a site with better privacy.


- Cyberthreats detected last year that were Trojan horse programs.

Exterminating Online Pests

- Protect Your Computers from Malicious Internet Invaders, a new book from Preston Gralla, shows how to trap these invaders in a protective web that keeps your computer running smoothly and your personal information safe.

When Cybercriminals Turn Pro

- Cole and his team wanted to examine the changing nature of hackers and malicious-code writers, and the communities in which they work. As a basis for their research, the Symantec team looked specifically at an increasingly widespread Trojan horse program called Bancos that targets customers of some Latin American banks and tries to steal their account passwords.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.