Staff Report

Most Recent Articles by Staff Report

Women in IT Security: 10 Power Players

Women in IT Security: 10 Power Players

These 10 women were selected for their longstanding contributions to the IT security space.

Women in IT Security: Women of influence

Women in IT Security: Women of influence

We enlisted a team of moderators to ask a number of prominent IT security professionals about the challenges they faced as a woman entering the field, the prejudices they deal with every day and the skills they use to navigate within their business.

Women in IT Security: Women to watch

Women in IT Security: Women to watch

Profiles of five women who are advancing the IT security field through their advocacy, legal expertise, engineering acumen and entrepreneurial efforts.

SC Magazine eBook on SIEM (2015)

SC Magazine eBook on SIEM (2015)

Life would be much easier for security teams if log files were able to flash an alert that says, "The system has a problem here." However, the reality in most enterprises is that the amount of data contained in logs can be massive, especially when the operating system, applications, network devices, storage devices, servers and workstations all are generating multiple log files concurrently. As this new eBook from SC Magazine explains, for the IT personnel in charge of enterprise security, separating the few really important alerts from all the noise becomes of paramount importance.

More Articles by Staff Report

2015 PCI eBook

2015 Chip Card eBook

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US