SC Media Editorial | IT Security

Editorial

No ID? Get off my cloud

Cloud-based IAM puts authentication to the test Traditional brick-and-mortar organizations with on-premise servers are striving every day to keep pace with cloud-driven digital enterprises that are untethered by physical restraints, enabling employees to work from anywhere, accessing applications, services and mobile devices as regular parts of their flexible workdays. However, much like ducks on the…

The mighty microservice

Taking containers to the next level Microservices: Containers on steroids As container technology continues to evolve from its earliest days on UNIX, it has found its way into new uses and deployments, inspired by the imagination and creativity of software developers and IT engineers. With the birth and development of the next generation of container…

Manipulating human nature

Breaking bad and good habits Understanding social engineering is the first step to overcoming it. Danny Bradbury reports Complicated malware infections and cross-site scripting attacks are great techniques to compromise a company, but why use them when you can whisper in someone’s ear instead? Some of the most successful attacks involve nothing more than a phone, some self-confidence, and…