Email Updates

To receive updates on SC Magazine events, please sign-up here.

Events

SC Awards 2015

Nominations for the SC Awards U.S. 2015 are now open!

SC Congress Toronto 2014

Canada’s premier information security conference & expo experience.

SC Congress New York 2014

The highly anticipated event in the Big Apple will take place on October 21 this year.

SC Congress Chicago 2014

Registration is now open for SC Congress Chicago!

Virtual Events

Chat with our exhibitors during the live eConference events.

Editorial Webcasts

Shared responsibility: Securing the cloud

Organizations turn to cloud precisely because it allows both flexibility and scalability. But, many still view cloud - and cloud vendors - with trepidation, pointing to security issues, such as last year's iCloud breach, which revealed nude celebrity photos and consequently dominated the headlines in 2014.

Readying the enterprise for mobile

It's too late to put the kibosh on mobile computing in the enterprise. And why would any organization want to? The benefits are clear.

Contending with online thieves and fraudsters

As we all gear up for the holidays with plans to purchase any number of items online, cyberthieves too are gearing up with more and more creative ways to steal money, credentials and critical data from any number of organizations.

Vendor Webcasts

Top 5 reasons to switch to better endpoint protection

Today's threats are becoming increasingly complex. Organizations can no longer rely on antivirus alone and must be on the lookout for innovative, next-generation endpoint protection solutions.

Mid-market mayhem

You see it every day in the media, blog posts and industry marketing; "It isn't a question of if, but when." This defeatist attitude is settling over the industry like Death's own shawl.

Building a sophisticated endpoint defense strategy with full security lifecycle protection

Attackers are more sophisticated than they've ever been. They're targeting our intellectual property, sensitive customer information, user information and much more. The network is not the target—it's the endpoint where that data resides.

Sign up to our newsletters