Site Map - IT

Insights on Internet Investigations

- The National Institute of Justice has issued another in its series of reports on investigating high-tech crimes.

Who's Who and What's Where

- (ISC)2 has issued its '2007 Resource Guide for Today's Information Security Professional, Global Edition.'

Forging Ahead with Radio Frequency

- Best practices for RFID in identity management.

Wireless Intrusion Prevention WIPing Into Shape

- Major companies pay increased attention to preventing wireless network intrusion.

Watching the Web

- How one company tracks employees' Internet use, including wireless access, to monitor both activity and bandwidth requirements.

A New Perspective on Protecting Personal Data

- A trio of computer scientists at Stanford University is developing a conceptual framework for understanding privacy expectations and their implications using the tenets of a principle called contextual integrity.

Time to Give Data Mining the Shaft?

- Data mining and privacy. Some say the concepts are in irretrievable conflict.

Two Studies Examine Fingerprinting

- In turns out that left and right differ even in the mundane world of fingerprint analysis.

Software Security: Building Security In

- McGraw goes into detail not only about writing secure code but also about key related areas, which he terms “the seven touchpoints of software security.”

Computer Security

- Numerous states have created laws that require companies to notify consumers in the event of an electronic security breach. The laws include exceptions when the notification would be extremely costly, though the figures differ by state.

Coupon Crime Costing a Pretty Penny

- The battle against coupon fraud.


- 100 The number, in millions, of records containing personal information reported compromised between February 2005 and December 2006, according to the Privacy Rights Clearinghouse.

Barriers to Better IT Security

- What prevents IT professionals from setting up the best possible security programs?

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.