Latest Resources

IT Security Ebooks

SC Magazine eBook on Identity and Access Management (2015)

SC Magazine eBook on Identity and Access Management (2015)

Managing identity and access management (IAM) has become one of the most important underlying security challenges as CISOs battle the massive number of intruders attempting to compromise user credentials. Ultimately this becomes the last firewall between authentic users and attackers with stolen credentials. This latest ebook from SC Magazine explores strategies companies are employing to protect data residing on remote servers, in the cloud and on personal devices from credential thieves.

SC Magazine eBook on Secure Development Practices (2015)

SC Magazine eBook on Secure Development Practices (2015)

With the threat landscape only growing more sophisticated, companies are under a lot of pressure to ensure that the software applications they employ are completely secure. Secure development is an industry standard that mandates code and processes used in creating applications are as secure as possible. This process involves a number of step, including deploying a security development lifecycle (SDL) and secure coding. The problem, of course, is that software is being created everywhere in the world with a range of safety measures in place - from cautious to who cares. Those responsible companies maximizing the security of their software development are in competition with other enterprises which take the matter less seriously, resulting in a flood of faulty software which can be deployed unknowingly. We dig deep to uncover the optimal processes and speak with experts to gain insights.

Road Warrior Spotlight

For access to the internet and corporate networks, today's most efficient road warriors equip themselves with a range of devices, accessories and services - everything from laptops, tablets and smartphones to 3G modems, as well as video and conferencing apps using VoIP, like Google Voice, FaceTime and Skype. But, while mobile connections can be convenient for workers on the go, the security of the transmissions is still a primary concern for those charged with protecting corporate assets. And, individuals emailing and transferring documents from a café, hotel room or any Wi-Fi-enabled hotspot outside of their protected VPN, is potentially putting their own personal data at risk. 

What can road warriors do to better protect their employer's data (as well as their own personal information)? For this latest Spotlight we spoke with a number of industry experts to gain their first-hand knowledge of best practices, tools and strategies that, if implemented, could greatly improve the security of digital transmissions - be it via email, dropping files onto a shared cloud server, mobile phone call or videoconference.

Download the PDF now!

Case Studies

Options surety: Case study

Options surety: Case study

The MIAX Options Exchange needed more than a way to appease regulators, it also required security assurance. Greg Masters reports.

Safe passage: Case study

Safe passage: Case study

HR firm Pasona N A needed strong and flexible security for file-sharing around the globe, reports Greg Masters.

Charity charge: Case study

Charity charge: Case study

Even human service agencies are targets for cyber intruders, so Goodwill Industries installed a defensive solution, reports Greg Masters.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US