IT Security Ebooks
Managing identity and access management (IAM) has become one of the most important underlying security challenges as CISOs battle the massive number of intruders attempting to compromise user credentials. Ultimately this becomes the last firewall between authentic users and attackers with stolen credentials. This latest ebook from SC Magazine explores strategies companies are employing to protect data residing on remote servers, in the cloud and on personal devices from credential thieves.
With the threat landscape only growing more sophisticated, companies are under a lot of pressure to ensure that the software applications they employ are completely secure. Secure development is an industry standard that mandates code and processes used in creating applications are as secure as possible. This process involves a number of step, including deploying a security development lifecycle (SDL) and secure coding. The problem, of course, is that software is being created everywhere in the world with a range of safety measures in place - from cautious to who cares. Those responsible companies maximizing the security of their software development are in competition with other enterprises which take the matter less seriously, resulting in a flood of faulty software which can be deployed unknowingly. We dig deep to uncover the optimal processes and speak with experts to gain insights.
Road Warrior Spotlight
What can road warriors do to better protect their employer's data (as well as their own personal information)? For this latest Spotlight we spoke with a number of industry experts to gain their first-hand knowledge of best practices, tools and strategies that, if implemented, could greatly improve the security of digital transmissions - be it via email, dropping files onto a shared cloud server, mobile phone call or videoconference.
The MIAX Options Exchange needed more than a way to appease regulators, it also required security assurance. Greg Masters reports.
HR firm Pasona N A needed strong and flexible security for file-sharing around the globe, reports Greg Masters.
Even human service agencies are targets for cyber intruders, so Goodwill Industries installed a defensive solution, reports Greg Masters.