Our SC Magazine "Spotlight" editions are all about focus. Although our regular monthly issues take varied and deep looks into any number of timely topics, our "Spotlights" cover only one, very current problem afflicting the business world with feature stories, in-depth analysis, Q&As, expert columns and the latest news and research.
For more information about Spotlight editions from SC Magazine, contact Illena Armstrong, VP, editorial, at email@example.com.
If your company is interested in sponsoring a Spotlight, please contact David Steifman, VP, sales, at 646-638-6008, or via email at firstname.lastname@example.org.
Road Warriors Spotlight 2015
Smartphones, tablets, even computers embedded in your car enable data to flow unimpeded between the road warrior and the home office, but the security of communications is still a challenge for IT personnel charged with protecting network data. Complementing the rise of workers performing their tasks away from a central office has been the expansion of the use of cloud-based technology. But, what's the deal with cloud-based internet security platforms? Are these platforms safe enough to provide carrier-grade security to mobile and guest users? We examine the field and delve deep with experts to assess the options.
This new Spotlight edition of SC Magazine explores this fabulous new world of everywhere and anywhere connections, with an emphasis on what defenses are effective and how mobile workers can connect most securely.
Security Planning Spotlight 2015
For the security industry, the tide is shifting. Executives and boards are recognizing future ROI benefits in beefing up security when alerted to the potential of a three to five percent sales decline following a data breach. No board wants to see its company in the headlines as a consequence of an attack and subsequent loss of proprietary or customer data. While not easy to calculate, brand damage can have a devastating impact on an operation - witness the fallout to just a recent spate of victims: Anthem, JPMorgan Chase, Sony, Target, Home Depot.
According to the experts we spoke to for this special Spotlight on Security Planning, it's not going to be easy, though, to achieve all these worthwhile goals. A fundamental shift is required to alter how organizations efficiently achieve risk, governance and compliance. In addition, there has to be an understanding of the roles, challenges and goals of both the security and IT operations teams in order to change.
APT Spotlight 2014
APTs occur over the long term, surreptitiously stealing valuable data from targeted organizations. Part One of this new Spotlight from SC Magazine investigates the scourge. We spoke with a wide range of experts to paint a broad picture of this tactic. Part Two, which will blast in a few weeks, continues our examination of APTs and offers solutions to help mitigate the damage they cause.
APTs show little sign of disappearing as a serious threat. The malware associated with APTs is always evolving, and threat actors are going after anything at the enterprise level. Exacerbating the situation: There is a thriving underground market for selling the tools and techniques necessary to stage an attack. Not only are the bad guys winning, they are already in your network. The question you need to ask is, How do I get them out? We provide some tools and strategies you can apply to mitigate this challenge.
Road Warrior Spotlight 2014
What can road warriors do to better protect their employer's data (as well as their own personal information)? For this latest Spotlight we spoke with a number of industry experts to gain their first-hand knowledge of best practices, tools and strategies that, if implemented, could greatly improve the security of digital transmissions - be it via email, dropping files onto a shared cloud server, mobile phone call or videoconference.
Online Fraud Spotlight 2014
This "Spotlight on Online Fraud," a special issue of SC Magazine, focuses on the deceitful tricks, tactics and strategies the "bad guys" are employing to penetrate defenses to get to the data, and the tools and policies security personnel use - and are developing -to thwart those efforts.
We spoke with a number of industry experts to gain their perspectives, and delve deeply into every aspect of doing business online affecting the security of transactions and the data entrusted to corporate partners.
Education Spotlight 2014
The field of IT security is thriving - and only expanding - as the protection of corporate and government assets remains a pressing issue. Yet, as this special SC Magazine Spotlight on Education reveals, the talent pool of qualified professionals is insufficient to meet the demand.
We're here to help. In these pages, we've gathered a number of expert viewpoints to explore the role of grade-level courses and those of higher learning at colleges and universities to gain an understanding of how the IT security and information industries might fare in the future.
And what about the security executive of today already in place in our large and small enterprises in both government and the private sector? Continuing education is a necessity as skill sets evolve and persuasive communication with the boardroom becomes essential.
And, to top it all off, this issue includes our seventh annual Q&A with a number of schools and universities sanctioned by the National Security Agency and the Department of Homeland Security as Centers of Academic Excellence in Information Assurance (IA) and/or Research.
Download the PDF now!
Social Media Spotlight 2013
The public is staking a future on social media platforms, pinning their hopes and dreams on an online experience that has certainly entertained them. And the use of Facebook, Twitter, LinkedIn and numerous other social media platforms have proven beneficial to enterprises - blasting out their corporate message and thus enticing targeted individuals to visit their websites.
However, the platforms are a cause of concern for the security professionals whose job it is to keep corporate data where it belongs and to make certain its networks are as clean as possible from malware and intrusive attacks.
This special Spotlight on Social Media edition of SC Magazine reviews some of the challenges they face in light of developments in the BYOD movement, cloud computing, compliance requirements, the bevy of cyber attacks and more.
Download the PDF now!
Education Spotlight 2013
This special Spotlight on Education edition of SC Magazine looks at the state of educational opportunities for IT security pros and reviews just some of the challenges they face in light of developments in the BYOD movement, cloud computing, compliance requirements, the bevy of cyber attacks and more. Also included is our annual survey of colleges and universities offering information assurance programs recognized by the NSA and DHS.
Download the PDF now!
Insider Threat Spotlight 2013
While the risk of data theft by employees and third parties has long been a challenge for security personnel, the recent betrayals of privileged access by Pvt. Bradley Manning and NSA whistleblower Edward Snowden have made the inside threat the stuff of headlines.
This new Spotlight on Insider Threat from SC Magazine examines the latest developments and offers immediate tactics and long-terms plans you can take to address myriad issues associated with the risks posed by trusted insiders.
Mobile Spotlight 2013
There's no longer any question that we are all now part of a mobile workforce. Most of us are using smartphones, laptops and tablets to not only watch YouTube videos while on the train, but to access corporate networks to perform job duties.
While the BYOD phenomenon has certainly been a boon to convenience, added to production efficiencies and lowered costs, for security practitioners, a whole new set of challenges has arisen.
This new Spotlight on Mobile Security from SC Magazine examines the latest developments and offers immediate tactics and long-terms plans you can take to address myriad issues associated with mobile device use.
Download the PDF now!
Social Media Spotlight
Our special Spotlight series is back for the holidays, this time with a fresh focus on social media and its security and privacy ramifications.
Cyber criminals have taken a particular liking to these platforms, given the amount of users who flock there to interact. Plus, sites like Twitter and Facebook form a vast repository for personal or proprietary data, making accidental disclosure or intentional targeting a real concern.
As such, business executives must discern just how to marry business-related social media use with all of the risks that it embodies, and then decide if social networking is friend or foe.
Education Spotlight 2012
In this special Spotlight edition of SC Magazine we present some updates on the certifications for which most of you must gain continuing education credits, while also sharing with you some news on the latest credentials that certification bodies are putting out there. As well, for the fifth year we provide a listing of the top information assurance programs as decided by the U.S. Department of Homeland Security and the National Security Agency.
Also, we include some opinions from leading information security pros to hear what they think of IT security education now and whether it has evolved to where it needs to be or if it still has some maturing to do.
Download the PDF now
Insider Threat Spotlight 2012
This special edition of SC Magazine, "Spotlight on the Insider Threat," examines how insider-led breaches happen and why today's digital climate is conducive for continued incidents. We speak with industry experts who share advice on strategies, policies, and technologies.
Download the PDF now!
Mobile Spotlight 2012
It goes without saying that one of the most concerning topics in information security today revolves around mobile devices. Our latest "Spotlight" edition once again takes on the mobile security challenge by exploring the exploding market of mobile security services and tools, and the effect they currently have on the enterprise. Many IT security professionals and their superiors admit that they are far from getting a handle on all the challenges associated with mobile technologies.
As organizations continue to embrace mobility and BYOD, how can CISOs properly address security implications? When threats tied to BYOD morph into successful attacks, they slow us workers down, hurt our organizations' brands and, ultimately, impact our collective success. The issues are countless, but in this edition of our Spotlight series, we try to cover them all and provide some tips along the way.
Spotlight on Social Media
We never disconnect from social media. Not only do we count on these channels to communicate with friends and interesting people, but we also rely on them to reach customers, collaborate with co-workers, and generate new revenue streams. Thus, blocking access to sites such as Facebook and Twitter is quickly becoming taboo.
But given the sheer amount of and ease by which personal information can be shared on these sites present a major enterprise risk. SC Magazine's newest installment of our special "Spotlight" editions will help you, the security professional, hone in on the insider and external threats presented by social networking so you can protect your organization's crown jewels: its data. We hope you enjoy.
Spotlight on Cloud
The third "Spotlight" edition of SC Magazine provides an in-depth analysis on securing data in the cloud and the effect this is having on enterprise security. There's no doubt that cloud services offer reduced cost, scalability, flexibility, mobility and more. However, the lower total cost of ownership the cloud offers is quickly negated when critical business data is exposed or stolen because data there proved easy pickings to persistent cybercriminals.
This "Spotlight" edition offers a look at cloud concerns faced in the enterprise today - gathering intelligence from experts in the field, the latest reports and thorough investigation.
Spotlight on mobile
In this special Spotlight edition, we're taking on the mobile security challenge. It is one problem that most of our readers bring up to us time and again. To safeguard mobile devices used by business executives, the data stored on them and the connectivity to corporate networks they enable is a constant trial - one that is infrequently satisfactorily remedied. This is leaving many security pros comparing themselves to Sisyphus rolling a giant boulder up a steep hill over and over.
So, just how are companies supposed to secure these things - some private, some corporate-issued? What about the data they want to download on them? Any legal ramifications? How does the company stay compliant? The questions never end, so we thought it'd be helpful to slow down for a moment to thoroughly examine these more confounding mobile security concerns in this "Spotlight" edition. After you flip through its pages, let us know if you found what you needed. Text us or something...
SC Magazine Articles
- Yahoo breach; State-sponsored actors suspected, at least 500 million accounts affected
- Cybercriminals already able to hack ATM biometric readers
- 185M incidents bypassed perimeter defenses - report
- OVH suffers massive 1.1Tbps DDoS attack
- IoT assault, connected devices increasingly used for DDoS attacks
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- CEO sacked after aircraft company grounded by whaling attack
- DōTERRA breach exposes customer info; including SS, DOB, and addresses
- UPDATE: Petya ransomware leverages Dropbox and overwrites hard drives
- Some U.S. Bancorp workers' W-2 info exposed in ADP data breach
- End-of-support devices on networks weakening cyberdefenses, report
- Android.Lockerscreen using pseudorandom passcodes to ensure payouts
- FBI investigating hacked mobile phones of Democratic officials
- 70% of IDTMs want UK gov to do more so young people enter tech field
- 69% of office professionals in the UK hoard data