SC Magazine ebooks tackle how a particular topic in the IT and information technology market - everything from APT to cloud to mobile security - affects the various sectors - government, health care, financial, and more.


For more information about ebooks from SC Magazine, please contact Illena Armstrong, VP, editorial, at illena.armstrong@haymarketmedia.com.


If your company is interested in sponsoring an ebook, please contact David Steifman, VP, sales, at 646-638-6008, or via email at david.steifman@haymarketmedia.com.

IT Security Ebooks

2014 Application security ebook

2014 Application security ebook

We speak with a number of industry experts to gain a lucid understanding of the threat landscape and provide tools and strategies companies can put in place to achieve success in safeguarding their enterprises from porous software coding in their applications.

2014 Big Data ebook

2014 Big Data ebook

In this new ebook we speak with a range of experts to glean their insights on the technologies and strategies they are putting in place to guard their treasure troves and prevent both insider incidents and attacks from the outside.

2014 audit and compliance ebook

2014 audit and compliance ebook

We explore the landscape today with which security teams must contend and compile a number of best practices and strategies you can apply to protect your company.

2014 eBook on Encryption

2014 eBook on Encryption

The experts we spoke to for this new ebook agree that when deciding what data must be encrypted, it's a question of classifying it by level of importance.

PCI 2014: From compliance to security

PCI 2014: From compliance to security

The consensus from our panel of experts is that PCI DSS should be just one item on a far broader effort to integrate data security into enterprise risk management.

Is SIEM up to the challenge?

Is SIEM up to the challenge?

This latest ebook from SC Magazine paints a lucid picture of today's SIEM capabilities and challenges to help you decide what might be the right implementation for your organization.

The Game is On: Advanced Persistent Threats

The Game is On: Advanced Persistent Threats

APTs give IT teams headaches, because they are extremely stealthy in nature and are almost always aimed at a very specific target. On the other hand, they are designed to remain in the network undetected for extended periods of time, all the while stealing sensitive company data.

Mobile in motion

Mobile in motion

In this latest ebook from SC Magazine, we examine a number of strategies and technologies that can be implemented to manage data and protect corporate assets, while letting employees enjoy the convenience and productivity of mobile devices.

The accidental threat

The accidental threat

Some estimates show that 25 to 35 percent of employees have "inappropriate access" to data, and experts recommend that companies have strong internal controls that assume an insider attack is imminent.

Cloud: From both sides now

Cloud: From both sides now

While cloud vendors vie for dominance in attracting customers with their promises of data access anywhere, and better security than a company might be able to provide for itself, the bottom line is that client companies are responsible for their data, regardless of where it resides.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US