SC Magazine ebooks tackle how a particular topic in the IT and information technology market - everything from APT to cloud to mobile security - affects the various sectors - government, health care, financial, and more.


For more information about ebooks from SC Magazine, please contact Illena Armstrong, VP, editorial, at illena.armstrong@haymarketmedia.com.


If your company is interested in sponsoring an ebook, please contact David Steifman, VP, sales, at 646-638-6008, or via email at david.steifman@haymarketmedia.com.

IT Security Ebooks

2015 PCI eBook

2015 PCI eBook

Recent high-profile data breaches at major retailers demonstrate clearly that while the Payment Card Industry Data Security Standard (PCIDSS) might be a starting point for securing consumers' personally identifiable information, it is no barrier to the challenge of dedicated attackers.

2015 Chip Card eBook

2015 Chip Card eBook

After years of resistance in the U.S., a migration is well underway - moving from traditional magnetic stripe charge cards to EMV cards that contain an embedded integrated circuit.

APTs: New, improved and smarter than ever

APTs: New, improved and smarter than ever

While a return to a pre-APT Eden may be both unlikely and perhaps impossible, as this new ebook finds there are things that organizations and the industry as a whole can do to rebuild a more generally trustworthy environment.

2015 insider threat ebook

2015 insider threat ebook

The consensus of the experts we spoke with is that the continual deluge of high-profile cyber attacks during the past year reinforces the need for organizations to be cognizant of risks under their roofs.

2015 threat intelligence ebook

2015 threat intelligence ebook

While threat intelligence didn't stop attackers of the health care giant Anthem, the breach is likely to add to the pressure to improve efforts to make threat data intelligible and useful to frontline IT security specialists.

2015 DDoS ebook

2015 DDoS ebook

They are brutal, in-your-face power invasions designed to overwhelm servers and bring networked systems down without any nuance or surreptitiousness. This latest ebook explores the newest iterations of this scourge and how best to defend against them.

2015 identity and access management ebook

2015 identity and access management ebook

In many companies, information security in general and segregation of duties in particular, are lower security priority because the process tends to be costly and time-consuming. The key is to give users just the access they need when they need it and no more.

2015 Cloud security ebook

2015 Cloud security ebook

Individuals and huge global organizations have become equally dependent on the scalable, on-demand, IT resources the cloud provides.

2014 Application security ebook

2014 Application security ebook

We speak with a number of industry experts to gain a lucid understanding of the threat landscape and provide tools and strategies companies can put in place to achieve success in safeguarding their enterprises from porous software coding in their applications.

2014 Big Data ebook

2014 Big Data ebook

In this new ebook we speak with a range of experts to glean their insights on the technologies and strategies they are putting in place to guard their treasure troves and prevent both insider incidents and attacks from the outside.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US