SC Magazine ebooks tackle how a particular topic in the IT and information technology market - everything from APT to cloud to mobile security - affects the various sectors - government, health care, financial, and more.
For more information about ebooks from SC Magazine, please contact Illena Armstrong, VP, editorial, at firstname.lastname@example.org.
If your company is interested in sponsoring an ebook, please contact David Steifman, VP, sales, at 646-638-6008, or via email at email@example.com.
IT Security Ebooks
In this new ebook we speak with a range of experts to glean their insights on the technologies and strategies they are putting in place to guard their treasure troves and prevent both insider incidents and attacks from the outside.
We explore the landscape today with which security teams must contend and compile a number of best practices and strategies you can apply to protect your company.
The experts we spoke to for this new ebook agree that when deciding what data must be encrypted, it's a question of classifying it by level of importance.
The consensus from our panel of experts is that PCI DSS should be just one item on a far broader effort to integrate data security into enterprise risk management.
This latest ebook from SC Magazine paints a lucid picture of today's SIEM capabilities and challenges to help you decide what might be the right implementation for your organization.
APTs give IT teams headaches, because they are extremely stealthy in nature and are almost always aimed at a very specific target. On the other hand, they are designed to remain in the network undetected for extended periods of time, all the while stealing sensitive company data.
In this latest ebook from SC Magazine, we examine a number of strategies and technologies that can be implemented to manage data and protect corporate assets, while letting employees enjoy the convenience and productivity of mobile devices.
Some estimates show that 25 to 35 percent of employees have "inappropriate access" to data, and experts recommend that companies have strong internal controls that assume an insider attack is imminent.
While cloud vendors vie for dominance in attracting customers with their promises of data access anywhere, and better security than a company might be able to provide for itself, the bottom line is that client companies are responsible for their data, regardless of where it resides.
With cyber threats attracting more attention - from executives in the C-suite and federal regulators - financial institutions are going to greater lengths and working together to safeguard their assets.
Sign up to our newsletters
SC Magazine Articles
- Microsoft report explores dangers of running expired security software
- Survey: real-time SIEM solutions help orgs detect attacks within minutes
- Vulnerabilities identified in three Advantech products
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- State Department hack may be tied to White House network breach
- Operators disable firewall features to increase network performance, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Upping the ante: PCI Security Standard
- Study: Third of employees use company devices for social media and online shopping
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Swedish appeals court nixes Assange's plea
- Critical XSS vulnerability addressed in WordPress
- The Internet of Things (IoT) will fail if security has no context