Our SC Magazine "Spotlight" editions are all about focus. Although our regular monthly issues take varied and deep looks into any number of timely topics, our "Spotlights" cover only one, very current problem afflicting the business world with feature stories, in-depth analysis, Q&As, expert columns and the latest news and research.
For more information about Spotlight editions from SC Magazine, contact Illena Armstrong, VP, editorial, at email@example.com.
If your company is interested in sponsoring a Spotlight, please contact David Steifman, VP, sales, at 646-638-6008, or via email at firstname.lastname@example.org.
We spoke with a number of industry experts to gain their perspectives, and delve deeply into every aspect of doing business online affecting the security of transactions and the data entrusted to corporate partners.
The field of IT security is thriving - and only expanding - as the protection of corporate and government assets remains a pressing issue. Yet, as this special SC Magazine Spotlight on Education reveals, the talent pool of qualified professionals is insufficient to meet the demand.
We're here to help. In these pages, we've gathered a number of expert viewpoints to explore the role of grade-level courses and those of higher learning at colleges and universities to gain an understanding of how the IT security and information industries might fare in the future.
And what about the security executive of today already in place in our large and small enterprises in both government and the private sector? Continuing education is a necessity as skill sets evolve and persuasive communication with the boardroom becomes essential.
And, to top it all off, this issue includes our seventh annual Q&A with a number of schools and universities sanctioned by the National Security Agency and the Department of Homeland Security as Centers of Academic Excellence in Information Assurance (IA) and/or Research.
Download the PDF now!
The public is staking a future on social media platforms, pinning their hopes and dreams on an online experience that has certainly entertained them. And the use of Facebook, Twitter, LinkedIn and numerous other social media platforms have proven beneficial to enterprises - blasting out their corporate message and thus enticing targeted individuals to visit their websites.
However, the platforms are a cause of concern for the security professionals whose job it is to keep corporate data where it belongs and to make certain its networks are as clean as possible from malware and intrusive attacks.
This special Spotlight on Social Media edition of SC Magazine reviews some of the challenges they face in light of developments in the BYOD movement, cloud computing, compliance requirements, the bevy of cyber attacks and more.
Download the PDF now!
While the risk of data theft by employees and third parties has long been a challenge for security personnel, the recent betrayals of privileged access by Pvt. Bradley Manning and NSA whistleblower Edward Snowden have made the inside threat the stuff of headlines.
This new Spotlight on Insider Threat from SC Magazine examines the latest developments and offers immediate tactics and long-terms plans you can take to address myriad issues associated with the risks posed by trusted insiders.
There's no longer any question that we are all now part of a mobile workforce. Most of us are using smartphones, laptops and tablets to not only watch YouTube videos while on the train, but to access corporate networks to perform job duties.
While the BYOD phenomenon has certainly been a boon to convenience, added to production efficiencies and lowered costs, for security practitioners, a whole new set of challenges has arisen.
This new Spotlight on Mobile Security from SC Magazine examines the latest developments and offers immediate tactics and long-terms plans you can take to address myriad issues associated with mobile device use.
Download the PDF now!
Our special Spotlight series is back for the holidays, this time with a fresh focus on social media and its security and privacy ramifications.
Cyber criminals have taken a particular liking to these platforms, given the amount of users who flock there to interact. Plus, sites like Twitter and Facebook form a vast repository for personal or proprietary data, making accidental disclosure or intentional targeting a real concern.
As such, business executives must discern just how to marry business-related social media use with all of the risks that it embodies, and then decide if social networking is friend or foe.
In this special Spotlight edition of SC Magazine we present some updates on the certifications for which most of you must gain continuing education credits, while also sharing with you some news on the latest credentials that certification bodies are putting out there. As well, for the fifth year we provide a listing of the top information assurance programs as decided by the U.S. Department of Homeland Security and the National Security Agency.
Also, we include some opinions from leading information security pros to hear what they think of IT security education now and whether it has evolved to where it needs to be or if it still has some maturing to do.
Download the PDF now
It goes without saying that one of the most concerning topics in information security today revolves around mobile devices. Our latest "Spotlight" edition once again takes on the mobile security challenge by exploring the exploding market of mobile security services and tools, and the effect they currently have on the enterprise. Many IT security professionals and their superiors admit that they are far from getting a handle on all the challenges associated with mobile technologies.
As organizations continue to embrace mobility and BYOD, how can CISOs properly address security implications? When threats tied to BYOD morph into successful attacks, they slow us workers down, hurt our organizations' brands and, ultimately, impact our collective success. The issues are countless, but in this edition of our Spotlight series, we try to cover them all and provide some tips along the way.
We never disconnect from social media. Not only do we count on these channels to communicate with friends and interesting people, but we also rely on them to reach customers, collaborate with co-workers, and generate new revenue streams. Thus, blocking access to sites such as Facebook and Twitter is quickly becoming taboo.
But given the sheer amount of and ease by which personal information can be shared on these sites present a major enterprise risk. SC Magazine's newest installment of our special "Spotlight" editions will help you, the security professional, hone in on the insider and external threats presented by social networking so you can protect your organization's crown jewels: its data. We hope you enjoy.
The third "Spotlight" edition of SC Magazine provides an in-depth analysis on securing data in the cloud and the effect this is having on enterprise security. There's no doubt that cloud services offer reduced cost, scalability, flexibility, mobility and more. However, the lower total cost of ownership the cloud offers is quickly negated when critical business data is exposed or stolen because data there proved easy pickings to persistent cybercriminals.
This "Spotlight" edition offers a look at cloud concerns faced in the enterprise today - gathering intelligence from experts in the field, the latest reports and thorough investigation.
In this special Spotlight edition, we're taking on the mobile security challenge. It is one problem that most of our readers bring up to us time and again. To safeguard mobile devices used by business executives, the data stored on them and the connectivity to corporate networks they enable is a constant trial - one that is infrequently satisfactorily remedied. This is leaving many security pros comparing themselves to Sisyphus rolling a giant boulder up a steep hill over and over.
So, just how are companies supposed to secure these things - some private, some corporate-issued? What about the data they want to download on them? Any legal ramifications? How does the company stay compliant? The questions never end, so we thought it'd be helpful to slow down for a moment to thoroughly examine these more confounding mobile security concerns in this "Spotlight" edition. After you flip through its pages, let us know if you found what you needed. Text us or something...