Standards  >   Security Standards  >   Encryption Standards  >  

Symmetric Cryptography

RSS Feed    Add to Google    Add to My Yahoo!
Symmetric CryptographyMultimedia (View All Report Types)
 
Surviving and Thriving in a World of Change
sponsored by Workday
WEBCAST: Watch this in-depth webcast to find out about the changes in financial management systems and regulations.
Posted: 21 Apr 2014 | Premiered: Feb 12, 2014

Workday

SearchSecurity.com University: Why SSL Certificate Security Matters
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn about specific methods used to exploit SSL and how to defend against them.
Posted: 21 Oct 2013 | Premiered: 24 Oct 2013

SearchSecurity.com

Data Breaches - Don't be a Headline!
sponsored by Absolute Software
WEBCAST: This webcast explains the aftermath of a data breach and what your organization can do to mitigate any risks surrounding data loss.
Posted: 19 Sep 2014 | Premiered: Sep 19, 2014

Absolute Software

Podcast: How Much Cybersecurity is Enough?
sponsored by CDW Corporation
PODCAST: In this podcast, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 29 Sep 2014 | Premiered: Sep 16, 2014

CDW Corporation

Best Practices for Leveraging Security Threat Intelligence
sponsored by AlienVault
WEBCAST: This exclusive webcast explores how you can use threat intelligence to stop attacks before they ever happen.
Posted: 09 Oct 2014 | Premiered: Oct 9, 2014

AlienVault

ISACA PCI Compliance Symposium
sponsored by Intel
WEBCAST: As we ring in 2011 around the globe, we should also stop and take a look at PCI Compliance – to see where we've been, and discuss where it's headed. Hear from an expert panel of speakers and learn about tokenization, PCI DSS, and what version 2.0 will mean for the future.
Posted: 04 Apr 2011 | Premiered: Jan 25, 2011

Intel

The Business Case for Tokenization
sponsored by Patrick Townsend Security Solutions
PODCAST: Tokenizing data eases compliance and saves money. In this podcast, Patrick Townsend, Townsend Security Founder and CTO, explains how tokenization and encryption differ, and how making it part of your data security strategy decreases your chance of data loss, saves you time and hassles.
Posted: 09 Aug 2010 | Premiered: Aug 9, 2010

Patrick Townsend Security Solutions

Boost Cloud Security with Intel® AES-NI
sponsored by Intel
VIDEO: Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attacks while boosting performance.
Posted: 07 Apr 2011 | Premiered: 10 Mar 2011

Intel

PCI DSS v3.0: How to Adapt your Compliance Strategy
sponsored by AlienVault
WEBCAST: With version 3.0 of PCI DSS now available, it's time to review your compliance strategy and make a plan for adapting to the revised requirements. View this webcast to learn more about the significant changes related to malware defenses, vulnerability assessments and penetration testing.
Posted: 20 Dec 2013 | Premiered: Dec 20, 2013

AlienVault

The Critical Security Controls – Moving Beyond the Checklist Mentality
sponsored by Lumension
PODCAST: The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.
Posted: 13 Aug 2009 | Premiered: Aug 13, 2009

Lumension
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement