Latest Resources

IT Security Ebooks

Mobile security

Mobile security

BYOD has enhanced productivity, but increased security concerns.

Application security

Application security

The threats to applications are evolving beyond the simple notion of "find exploit, access system, steal current data."

Social Media Spotlight

Our special Spotlight series is back for the holidays, this time with a fresh focus on social media and its security and privacy ramifications.

Cyber criminals have taken a particular liking to these platforms, given the amount of users who flock there to interact. Plus, sites like Twitter and Facebook form a vast repository for personal or proprietary data, making accidental disclosure or intentional targeting a real concern.


As such, business executives must discern just how to marry business-related social media use with all of the risks that it embodies, and then decide if social networking is friend or foe.


Download the PDF now!

Slideshows

April 2013 global threats

April 2013 global threats

Among other notable factoids, this month's global threats map indicates that Belarus was the leading source of all zombie IP ...

The state of malware 2013

The state of malware 2013

Based on McAfee Labs Research, this infographic attempts to predict the state of malware in 2013, including new threats and ...

April 2013 Threat Stats

April 2013 Threat Stats

According to this month's threat stats, the total number of records containing sensitive data involved in breaches in the U.S. ...

Emerging products: Virtual system security

Emerging products: Virtual system security

This month, we continue our periodic look at the hot product groups that are shaping the information security marketplace. Here ...

2013 Unified threat manager tools

2013 Unified threat manager tools

After dissecting some of the top Unified Threat Management (UTM) tools out in the market, the SC Lab team reported ...

Case Studies

Compliance confluence: 1st Credit and SureCloud

Compliance confluence: 1st Credit and SureCloud

A highly regulated debt collector from the U.K. needed to achieve compliance, but it wanted to scrap all of the point solutions on which it traditionally relied.

Game on: Case study with Electronic Arts and Allgress

Game on: Case study with Electronic Arts and Allgress

Video game players are used to fending off alien invaders, but the IT staff at Electronic Arts (EA) was challenged to reduce cyber risk within its own environment.

Staying current: Merit Medical Systems and Symplified

Staying current: Merit Medical Systems and Symplified

The apps used on mobile devices connected to its network contained sensitive data, so a medical device manufacturer needed to ensure that access control and authorization policies were enforced.

Podcasts

2012 Luminary Podcast: Chris Soghoian

Chris Soghoian, who was recently hired as the ACLU's first-ever principal technologist, has never been afraid to ruffle the feathers of the corporate establishment when it comes to privacy and security issues.

2012 Luminary Podcast: Valerie Aurora and Mary Gardiner

Valerie Aurora and Mary Gardiner have united to form a decade-long collaboration on a variety of "women in open source" advocacy projects, including developing anti-harassment policies at conferences.