SC Magazine ebooks tackle how a particular topic in the IT and information technology market - everything from APT to cloud to mobile security - affects the various sectors - government, health care, financial, and more.
For more information about ebooks from SC Magazine, please contact Illena Armstrong, VP, editorial, at email@example.com.
If your company is interested in sponsoring an ebook, please contact David Steifman, VP, sales, at 646-638-6008, or via email at firstname.lastname@example.org.
IT Security Ebooks
Managing identity and access management (IAM) has become one of the most important underlying security challenges as CISOs battle the massive number of intruders attempting to compromise user credentials. Ultimately this becomes the last firewall between authentic users and attackers with stolen credentials. This latest ebook from SC Magazine explores strategies companies are employing to protect data residing on remote servers, in the cloud and on personal devices from credential thieves.
With the threat landscape only growing more sophisticated, companies are under a lot of pressure to ensure that the software applications they employ are completely secure. Secure development is an industry standard that mandates code and processes used in creating applications are as secure as possible. This process involves a number of step, including deploying a security development lifecycle (SDL) and secure coding. The problem, of course, is that software is being created everywhere in the world with a range of safety measures in place - from cautious to who cares. Those responsible companies maximizing the security of their software development are in competition with other enterprises which take the matter less seriously, resulting in a flood of faulty software which can be deployed unknowingly. We dig deep to uncover the optimal processes and speak with experts to gain insights.
Last Thanksgiving, hackers rendered the computers and telecommunications at Sony Pictures inoperable and plundered its servers of everything - emails of top executives, health and financial PII and salaries of past and present employees, even completed movies that hadn't yet been released. Disasters such as this can hit your organization at any time. But, as this new ebook from SC Magazine reveals, there are tools and strategies to help get formal security plans and policies in place to best serve your enterprise when, during and after a data breach strikes.
The massive growth of interconnected devices has introduced convenience and efficiencies, but also is presenting new risks for enterprises already overwhelmed by IT security challenges. This latest ebook from SC Magazine looks at the greatest threats of the Internet of Things, why some traditional security measures may fall short, and the steps organizations should take to minimize risk and enhance security before it's too late.
Life would be much easier for security teams if log files were able to flash an alert that says, "The system has a problem here." However, the reality in most enterprises is that the amount of data contained in logs can be massive, especially when the operating system, applications, network devices, storage devices, servers and workstations all are generating multiple log files concurrently. As this new eBook from SC Magazine explains, for the IT personnel in charge of enterprise security, separating the few really important alerts from all the noise becomes of paramount importance.
If there is one constant in identity and access management (IAM), it is that not everyone needs access to everything all the time. As well, in many companies, information security in general and segregation of duties in particular, are lower security priority because the process tends to be costly and time-consuming. The key is to give users just the access they need when they need it and no more.
Recent high-profile data breaches at major retailers demonstrate clearly that while the Payment Card Industry Data Security Standard (PCIDSS) might be a starting point for securing consumers' personally identifiable information, it is no barrier to the challenge of dedicated attackers.
After years of resistance in the U.S., a migration is well underway - moving from traditional magnetic stripe charge cards to EMV cards that contain an embedded integrated circuit.
While a return to a pre-APT Eden may be both unlikely and perhaps impossible, as this new ebook finds there are things that organizations and the industry as a whole can do to rebuild a more generally trustworthy environment.
The consensus of the experts we spoke with is that the continual deluge of high-profile cyber attacks during the past year reinforces the need for organizations to be cognizant of risks under their roofs.
SC Magazine Articles
- Yahoo breach; State-sponsored actors suspected, at least 500 million accounts affected
- Cybercriminals already able to hack ATM biometric readers
- Education sector bullied by ransomware and can barely defend itself, report
- IoT assault, connected devices increasingly used for DDoS attacks
- OVH suffers massive 1.1Tbps DDoS attack
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- CEO sacked after aircraft company grounded by whaling attack
- DōTERRA breach exposes customer info; including SS, DOB, and addresses
- UPDATE: Petya ransomware leverages Dropbox and overwrites hard drives
- Some U.S. Bancorp workers' W-2 info exposed in ADP data breach
- State officials warn Congress: don't damage public confidence in election systems
- 'Lock Down Your Login' campaign urges authentication, furthers CNAP
- RIG EK rigged to steal tricks from Neutrino in fight to fill Angler's void
- SWIFT adds additional protective measures for members to ensure cybersecurity compliance
- 185M incidents bypassed perimeter defenses - report