IT Security Ebooks
Life would be much easier for security teams if log files were able to flash an alert that says, "The system has a problem here." However, the reality in most enterprises is that the amount of data contained in logs can be massive, especially when the operating system, applications, network devices, storage devices, servers and workstations all are generating multiple log files concurrently. As this new eBook from SC Magazine explains, for the IT personnel in charge of enterprise security, separating the few really important alerts from all the noise becomes of paramount importance.
If there is one constant in identity and access management (IAM), it is that not everyone needs access to everything all the time. As well, in many companies, information security in general and segregation of duties in particular, are lower security priority because the process tends to be costly and time-consuming. The key is to give users just the access they need when they need it and no more.
Road Warrior Spotlight
What can road warriors do to better protect their employer's data (as well as their own personal information)? For this latest Spotlight we spoke with a number of industry experts to gain their first-hand knowledge of best practices, tools and strategies that, if implemented, could greatly improve the security of digital transmissions - be it via email, dropping files onto a shared cloud server, mobile phone call or videoconference.
We’ve pulled together some standout quotes from experts in this WIS edition. Read their thoughts by clicking through “Voicing the ...
Phishing websites attempted to exploit Facebook 2.2 million times.
For the period reported, the EMA region, Europe, the Middle East, and Africa was the leading source of all zombie ...
There were 3,085,334 attacks in the United States last month, primarily originating from Seattle; Columbus, Ohio; New Providence, N.J.; Boston; ...
Biopharma companies need a secure digital signing infrastructure. SureClinical found an answer for them, reports Greg Masters.
Queens College found a solution to monitor activity and manage devices on its network, reports Greg Masters.
A Chicago-area high school found a solution to broaden its internet pipeline and maintain compliance, reports Greg Masters.
Sign up to our newsletters
SC Magazine Articles
- Report delves into RAT videos on YouTube
- Tor Project, Library Freedom Project to establish Tor exit nodes in libraries
- PagerDuty requires password change for all customers following breach
- Cisco: Attackers innovating, evading defenses in first half of 2015
- Does Windows 10 Wi-Fi Sense spell end of private wireless networks?