Recommended

eBooks

SC eBooks are independent, editorially driven products, sometimes underwritten by sponsors, that offer in-depth analysis of critical areas of interest to our readers. These comprehensive reports provide insights from industry experts specializing in the various aspects of data security, and hands-on analysis by CISOs of companies addressing these challenges on a daily basis.

Handcuffing the Mobile Octopus - MDM strategies: An embarrassment of niches

This eBook looks at how MDM works, the top qualities to look for in a solution, and best practices for securing sensitive corporate data. It also explores approaches to ensure productivity is embraced responsibly.

Trials & Tribulations of IAM

This ebook looks at how Islands of Identity can form and how you can overcome the challenges of managing incompatible identity and access management platforms.

The Mighty Microservice

This eBook looks at how containers can rein in the sprawl of virtual machines, why this is important, and how microservices can make a difference in the efficiency of the container environment.

A King's Ransom(ware)

Ransomware continues to be a headline grabber but where do these attacks rate compared to other cyberattacks? We look at the history of ransomware, its not-so-obvious impacts, and how you can prepare for the next attack.

My Friend, My Enemy

This special report looks at how social engineering works, why it works as well as it does, how to identify an attack and what to do if you think you’ve been compromised.

Curtain Going Up on GDPR

Here’s what you need in place now that GDPR is live. Incidentally, GDPR and EU compliance are not necessarily intuitive for the average US corporation.

Last Minute GDPR Compliance

It's too late to do GDPR compliance right for the May 2018 launch, but not too late to start. Download this ebook for recommendations on what to do first.

Phishing for Ransomware

SC Media looks at best practices to identify and stop phishing attacks with their destructive payloads before they take down the corporate network or hold your corporate data for ransom.