Latest Resources

IT Security Ebooks

SC Magazine eBook on SIEM (2015)

SC Magazine eBook on SIEM (2015)

Life would be much easier for security teams if log files were able to flash an alert that says, "The system has a problem here." However, the reality in most enterprises is that the amount of data contained in logs can be massive, especially when the operating system, applications, network devices, storage devices, servers and workstations all are generating multiple log files concurrently. As this new eBook from SC Magazine explains, for the IT personnel in charge of enterprise security, separating the few really important alerts from all the noise becomes of paramount importance.

SC Magazine eBook on Identity and Access Management (May 2015)

SC Magazine eBook on Identity and Access Management (May 2015)

If there is one constant in identity and access management (IAM), it is that not everyone needs access to everything all the time. As well, in many companies, information security in general and segregation of duties in particular, are lower security priority because the process tends to be costly and time-consuming. The key is to give users just the access they need when they need it and no more.

Road Warrior Spotlight

For access to the internet and corporate networks, today's most efficient road warriors equip themselves with a range of devices, accessories and services - everything from laptops, tablets and smartphones to 3G modems, as well as video and conferencing apps using VoIP, like Google Voice, FaceTime and Skype. But, while mobile connections can be convenient for workers on the go, the security of the transmissions is still a primary concern for those charged with protecting corporate assets. And, individuals emailing and transferring documents from a café, hotel room or any Wi-Fi-enabled hotspot outside of their protected VPN, is potentially putting their own personal data at risk. 

What can road warriors do to better protect their employer's data (as well as their own personal information)? For this latest Spotlight we spoke with a number of industry experts to gain their first-hand knowledge of best practices, tools and strategies that, if implemented, could greatly improve the security of digital transmissions - be it via email, dropping files onto a shared cloud server, mobile phone call or videoconference.

Download the PDF now!

Slideshows

VOICING THE ISSUE

VOICING THE ISSUE

We’ve pulled together some standout quotes from experts in this WIS edition. Read their thoughts by clicking through “Voicing the ...

June 2015 Threat Stats

June 2015 Threat Stats

Phishing websites attempted to exploit Facebook 2.2 million times.

June 2015 Threat Map

June 2015 Threat Map

For the period reported, the EMA region, Europe, the Middle East, and Africa was the leading source of all zombie ...

May 2015 Threat Stats

May 2015 Threat Stats

There were 3,085,334 attacks in the United States last month, primarily originating from Seattle; Columbus, Ohio; New Providence, N.J.; Boston; ...

Case Studies

Sign on the digital line: Case study

Sign on the digital line: Case study

Biopharma companies need a secure digital signing infrastructure. SureClinical found an answer for them, reports Greg Masters.

Case study: Fit for a queen

Case study: Fit for a queen

Queens College found a solution to monitor activity and manage devices on its network, reports Greg Masters.

Making the grade: CIPA compliance

Making the grade: CIPA compliance

A Chicago-area high school found a solution to broaden its internet pipeline and maintain compliance, reports Greg Masters.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US