Our SC Magazine "Spotlight" editions are all about focus. Although our regular monthly issues take varied and deep looks into any number of timely topics, our "Spotlights" cover only one, very current problem afflicting the business world with feature stories, in-depth analysis, Q&As, expert columns and the latest news and research.
For more information about Spotlight editions from SC Magazine, contact Illena Armstrong, VP, editorial, at illena.armstrong@haymarketmedia.com.
If your company is interested in sponsoring a Spotlight, please contact David Steifman, VP, sales, at 646-638-6008, or via email at david.steifman@haymarketmedia.com.
Our special Spotlight series is back for the holidays, this time with a fresh focus on social media and its security and privacy ramifications.
Cyber criminals have taken a particular liking to these platforms, given the amount of users who flock there to interact. Plus, sites like Twitter and Facebook form a vast repository for personal or proprietary data, making accidental disclosure or intentional targeting a real concern.
As such, business executives must discern just how to marry business-related social media use with all of the risks that it embodies, and then decide if social networking is friend or foe.

In this special Spotlight edition of SC Magazine we present some updates on the certifications for which most of you must gain continuing education credits, while also sharing with you some news on the latest credentials that certification bodies are putting out there. As well, for the fifth year we provide a listing of the top information assurance programs as decided by the U.S. Department of Homeland Security and the National Security Agency.
Also, we include some opinions from leading information security pros to hear what they think of IT security education now and whether it has evolved to where it needs to be or if it still has some maturing to do.
Download the PDF now
Flame, Anonymous, Zeus, nation-states...we're all familiar with these forms of attack. In fact, many of these incidents -- which are sourced to adversaries who can be anywhere on the planet, shrouded in secrecy -- are the stuff of headlines. But, another category of attack has received far less mainstream attention, but presents an equally significant, if not larger, liability to organizations: the insider threat.
It goes without saying that one of the most concerning topics in information security today revolves around mobile devices. Our latest "Spotlight" edition once again takes on the mobile security challenge by exploring the exploding market of mobile security services and tools, and the effect they currently have on the enterprise. Many IT security professionals and their superiors admit that they are far from getting a handle on all the challenges associated with mobile technologies.
As organizations continue to embrace mobility and BYOD, how can CISOs properly address security implications? When threats tied to BYOD morph into successful attacks, they slow us workers down, hurt our organizations' brands and, ultimately, impact our collective success. The issues are countless, but in this edition of our Spotlight series, we try to cover them all and provide some tips along the way.
We never disconnect from social media. Not only do we count on these channels to communicate with friends and interesting people, but we also rely on them to reach customers, collaborate with co-workers, and generate new revenue streams. Thus, blocking access to sites such as Facebook and Twitter is quickly becoming taboo.
But given the sheer amount of and ease by which personal information can be shared on these sites present a major enterprise risk. SC Magazine's newest installment of our special "Spotlight" editions will help you, the security professional, hone in on the insider and external threats presented by social networking so you can protect your organization's crown jewels: its data. We hope you enjoy.
The third "Spotlight" edition of SC Magazine provides an in-depth analysis on securing data in the cloud and the effect this is having on enterprise security. There's no doubt that cloud services offer reduced cost, scalability, flexibility, mobility and more. However, the lower total cost of ownership the cloud offers is quickly negated when critical business data is exposed or stolen because data there proved easy pickings to persistent cybercriminals.
This "Spotlight" edition offers a look at cloud concerns faced in the enterprise today - gathering intelligence from experts in the field, the latest reports and thorough investigation.
In this special Spotlight edition, we're taking on the mobile security challenge. It is one problem that most of our readers bring up to us time and again. To safeguard mobile devices used by business executives, the data stored on them and the connectivity to corporate networks they enable is a constant trial - one that is infrequently satisfactorily remedied. This is leaving many security pros comparing themselves to Sisyphus rolling a giant boulder up a steep hill over and over.
So, just how are companies supposed to secure these things - some private, some corporate-issued? What about the data they want to download on them? Any legal ramifications? How does the company stay compliant? The questions never end, so we thought it'd be helpful to slow down for a moment to thoroughly examine these more confounding mobile security concerns in this "Spotlight" edition. After you flip through its pages, let us know if you found what you needed. Text us or something...