Latest Resources

IT Security Ebooks

PCI 2014: From compliance to security

PCI 2014: From compliance to security

The consensus from our panel of experts is that PCI DSS should be just one item on a far broader effort to integrate data security into enterprise risk management.

Is SIEM up to the challenge?

Is SIEM up to the challenge?

This latest ebook from SC Magazine paints a lucid picture of today's SIEM capabilities and challenges to help you decide what might be the right implementation for your organization.

Social Media Spotlight

Our special Spotlight series is back for the holidays, this time with a fresh focus on social media and its security and privacy ramifications.

Cyber criminals have taken a particular liking to these platforms, given the amount of users who flock there to interact. Plus, sites like Twitter and Facebook form a vast repository for personal or proprietary data, making accidental disclosure or intentional targeting a real concern.


As such, business executives must discern just how to marry business-related social media use with all of the risks that it embodies, and then decide if social networking is friend or foe.


Download the PDF now!

Slideshows

Weekend news review: July 14-18

Weekend news review: July 14-18

This week, one study found that more than 75 percent of IT staffers have incorrectly reported the cause of a ...

Weekend news review: July 7-11

Weekend news review: July 7-11

Erasing an Android's memory might make its contents appear to be erased, but in actuality, a savvy hacker could easily ...

Weekend news review: June 30-July 3

Weekend news review: June 30-July 3

A U.S. baseball team's trade conversations were posted online and billions of dollars were stolen from Brazil this week. Plus, ...

The biggest breach disclosures in 2014...thus far

The biggest breach disclosures in 2014...thus far

We're only halfway through the year and already we've seen multiple large-scale breaches. The year's been marked by retailer breaches, ...

Weekend news review: June 23-27

Weekend news review: June 23-27

In this week's news, the Syrian Electronic Army struck again, but this time, the group targeted the ad network Taboola. ...

Case Studies

Case study: Mine games

Case study: Mine games

A website attack prompted an Australia-based mining company to shore up its security implementation, reports Greg Masters.

Network Rx: Health care security

Network Rx: Health care security

With the addition of 15,000 mobile devices accessing its network, a medical center found assurance - and met compliance mandates, reports Greg Masters.

Case study: Easing learning

Case study: Easing learning

Connection issues prompted an educational service in Illinois to find a solution to speed distribution of teaching materials. Greg Masters reports.

Podcasts

2012 Luminary Podcast: Chris Soghoian

Chris Soghoian, who was recently hired as the ACLU's first-ever principal technologist, has never been afraid to ruffle the feathers of the corporate establishment when it comes to privacy and security issues.

2012 Luminary Podcast: Valerie Aurora and Mary Gardiner

Valerie Aurora and Mary Gardiner have united to form a decade-long collaboration on a variety of "women in open source" advocacy projects, including developing anti-harassment policies at conferences.

Sign up to our newsletters

POLL