SC Magazine ebooks tackle how a particular topic in the IT and information technology market - everything from APT to cloud to mobile security - affects the various sectors - government, health care, financial, and more.
For more information about ebooks from SC Magazine, please contact Illena Armstrong, VP, editorial, at firstname.lastname@example.org.
If your company is interested in sponsoring an ebook, please contact David Steifman, VP, sales, at 646-638-6008, or via email at email@example.com.
IT Security Ebooks
Life would be much easier for security teams if log files were able to flash an alert that says, "The system has a problem here." However, the reality in most enterprises is that the amount of data contained in logs can be massive, especially when the operating system, applications, network devices, storage devices, servers and workstations all are generating multiple log files concurrently. As this new eBook from SC Magazine explains, for the IT personnel in charge of enterprise security, separating the few really important alerts from all the noise becomes of paramount importance.
If there is one constant in identity and access management (IAM), it is that not everyone needs access to everything all the time. As well, in many companies, information security in general and segregation of duties in particular, are lower security priority because the process tends to be costly and time-consuming. The key is to give users just the access they need when they need it and no more.
Recent high-profile data breaches at major retailers demonstrate clearly that while the Payment Card Industry Data Security Standard (PCIDSS) might be a starting point for securing consumers' personally identifiable information, it is no barrier to the challenge of dedicated attackers.
After years of resistance in the U.S., a migration is well underway - moving from traditional magnetic stripe charge cards to EMV cards that contain an embedded integrated circuit.
While a return to a pre-APT Eden may be both unlikely and perhaps impossible, as this new ebook finds there are things that organizations and the industry as a whole can do to rebuild a more generally trustworthy environment.
The consensus of the experts we spoke with is that the continual deluge of high-profile cyber attacks during the past year reinforces the need for organizations to be cognizant of risks under their roofs.
While threat intelligence didn't stop attackers of the health care giant Anthem, the breach is likely to add to the pressure to improve efforts to make threat data intelligible and useful to frontline IT security specialists.
They are brutal, in-your-face power invasions designed to overwhelm servers and bring networked systems down without any nuance or surreptitiousness. This latest ebook explores the newest iterations of this scourge and how best to defend against them.
In many companies, information security in general and segregation of duties in particular, are lower security priority because the process tends to be costly and time-consuming. The key is to give users just the access they need when they need it and no more.
Individuals and huge global organizations have become equally dependent on the scalable, on-demand, IT resources the cloud provides.
Sign up to our newsletters
SC Magazine Articles
- Free security tools help detect Hacking Team malware
- Zero-day in Fiat Chrysler feature allows remote control of vehicles
- Fake games in Google Play redirect Android users to porn sites
- All smartwatches are vulnerable to attack, finds study
- Survey: Black Hat 2015 attendees most concerned about targeted attacks
- 'GSMem' malware designed to infiltrate air-gapped computers, steal data
- Critical Android bugs can be exploited via MMS, 950M users affected
- Breach affects 3,000 clients enrolled in Georgia state program
- Top of the app charts - Shuabang: automated malware made in China
- Federal appeals court rules no expectation of privacy for preventable 'butt dials'