INFORMATION

Site Map - IT

Software Security: Building Security In

- McGraw goes into detail not only about writing secure code but also about key related areas, which he terms “the seven touchpoints of software security.”

Computer Security

- Numerous states have created laws that require companies to notify consumers in the event of an electronic security breach. The laws include exceptions when the notification would be extremely costly, though the figures differ by state.

Coupon Crime Costing a Pretty Penny

- The battle against coupon fraud.

Numbers

- 100 The number, in millions, of records containing personal information reported compromised between February 2005 and December 2006, according to the Privacy Rights Clearinghouse.

Barriers to Better IT Security

- What prevents IT professionals from setting up the best possible security programs?

Convergence: Merging Access Controls

- Merging physical and logical access controls.

Cybersecurity

- Get up to code with Web application security standards and learn how to plug up your cybersecurity holes before a hacker attacks here, here, and here.

Driver's Licenses

- Mayors, governors, and civil libertarians gave Congress an earful about the REAL ID Act, saying that it is costly, impractical, and will put private data at risk. They are pushing for a revised law.

Decoding Encryption Policy

- In the summer of 1995, a French student cracked a forty-bit key in eight days using 120 workstations and a few supercomputers.

New In PlainText

- A guide to hacking defenses is reviewed.

Malware's Evolving Threat

- An overview of malware assailing your computer.

Keep Communications in a Crisis

- Internet connectivity for phones and networks can be a boon in a crisis if companies know how to plan for that eventuality.

Quick Bytes - Testing IT Plans

- The National Institute of Standards and Technology has created an in-depth guide to tests, training, and exercise programs as they relate to IT plans.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.