IT Security Ebooks
Managing identity and access management (IAM) has become one of the most important underlying security challenges as CISOs battle the massive number of intruders attempting to compromise user credentials. Ultimately this becomes the last firewall between authentic users and attackers with stolen credentials. This latest ebook from SC Magazine explores strategies companies are employing to protect data residing on remote servers, in the cloud and on personal devices from credential thieves.
With the threat landscape only growing more sophisticated, companies are under a lot of pressure to ensure that the software applications they employ are completely secure. Secure development is an industry standard that mandates code and processes used in creating applications are as secure as possible. This process involves a number of step, including deploying a security development lifecycle (SDL) and secure coding. The problem, of course, is that software is being created everywhere in the world with a range of safety measures in place - from cautious to who cares. Those responsible companies maximizing the security of their software development are in competition with other enterprises which take the matter less seriously, resulting in a flood of faulty software which can be deployed unknowingly. We dig deep to uncover the optimal processes and speak with experts to gain insights.
Road Warrior Spotlight
What can road warriors do to better protect their employer's data (as well as their own personal information)? For this latest Spotlight we spoke with a number of industry experts to gain their first-hand knowledge of best practices, tools and strategies that, if implemented, could greatly improve the security of digital transmissions - be it via email, dropping files onto a shared cloud server, mobile phone call or videoconference.
Robert Half's latest report on IT salaries indicates most people in the field can expect a raise.
A former executive was arrested in San Francisco on charges of stealing trade secrets after learning his job with a ...
We’ve pulled together some standout quotes from experts in this WIS edition. Read their thoughts by clicking through “Voicing the ...
Phishing websites attempted to exploit Facebook 2.2 million times.
To ensure it could effectively react to all alerts, IDT put in place an automation solution. Greg Masters reports.
Biopharma companies need a secure digital signing infrastructure. SureClinical found an answer for them, reports Greg Masters.
Queens College found a solution to monitor activity and manage devices on its network, reports Greg Masters.
Sign up to our newsletters
SC Magazine Articles
- U.S. authorities identify Chinese companies that benefited from military cybertheft
- Samsung Pay secure despite LoopPay breach, company says
- Verizon lets users opt-out of controversial code tracker, will share data with AOL
- Former Reuters journalist convicted of helping Anonymous hack the LA Times
- Cyberattacks costing big business big bucks