SC Magazine ebooks tackle how a particular topic in the IT and information technology market - everything from APT to cloud to mobile security - affects the various sectors - government, health care, financial, and more.
For more information about ebooks from SC Magazine, please contact Illena Armstrong, VP, editorial, at illena.armstrong@haymarketmedia.com.
If your company is interested in sponsoring an ebook, please contact David Steifman, VP, sales, at 646-638-6008, or via email at david.steifman@haymarketmedia.com.
Although the promise of reduced costs has appealed to many enterprises looking to migrate legacy network systems to virtualization, security experts warn that the move must not trump careful contemplation and scrutiny by today's CIOs and IT leadership.
The threats to applications are evolving beyond the simple notion of "find exploit, access system, steal current data."
Available solutions are challenged to detect and protect identity and authenticate users.
With massive DDoS attacks targeting specific accounts, online banking and other e-commerce activities are under seige.
The easiest way to compromise a corporate network is through a user running a browser application.
In the face of constant and insidious threats from organized companies and government agencies are often hard-pressed to know where to draw the line in the sand.
At a recent SC Magazine Rountable, information security and compliance professionals discussed how changes in technology are leading to an evolution in their roles.
More and more enterprises are embracing cloud computing, both through service agreements and private development, to gain greater efficiencies and better scalability in tough economic times.
The strong perimeter defenses that for years defined network security have, for the most part, become merely a small inconvenience to those determined enough to get in.