Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Data Breach

RSS Feed    Add to Google    Add to My Yahoo!
Data Breach White Papers (View All Report Types)
 
Top Trends Shaping IAM in 2017
sponsored by OneLogin
WHITE PAPER: With the 9% of their overall IT security budgets already spent on IAM, many organizations are predicted to continue investing more of their money. Discover what factors are shaping IAM for near future in this Forrester report.
Posted: 13 Jul 2017 | Published: 21 Nov 2016

OneLogin

New Cybersecurity Regulations Adopted to Protect Financial Systems & Information
sponsored by HID Global
WHITE PAPER: According to a Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Revealed in this white paper is an overview of the New York Cybersecurity Regulation that requires organizations to demonstrate compliance by February 2018.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

HID Global

Check Your Armor: What's Your Most Vulnerable Cybersecurity Spot?
sponsored by Simeio
WHITE PAPER: When a company experiences a data breach, hack or other compromise to infrastructure or assets, the company does not realize all of the risk mitigation steps that were overlooked. This white paper reveals a comprehensive identity checklist to ensure your company does not fall victim to a data breach in the first place.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

Simeio

Examining SSL-encrypted Communications
sponsored by Netronome Systems
WHITE PAPER: SSL-encrypted communications have enabled a variety of secure, web-based communications and online transactions. This paper explores the drivers behind the increase in SSL usage and the methods used to confront the security challenges that SSL creates.
Posted: 26 Oct 2007 | Published: 16 Oct 2007

Netronome Systems

Internet-Scale Identity Systems:An Overview and Comparison
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.
Posted: 27 Mar 2014 | Published: 04 Mar 2014

Ping Identity Corporation

Defining Identity Management
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: This document defines the components of identity management, starting with the underlying business challenges of managing user identities and entitlements across multiple systems and applications. Identity management functions are defined in the context of these challenges.
Posted: 02 Jun 2010 | Published: 02 Jun 2010

Hitachi ID Systems, Inc.

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER: This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor

Protecting Commercial Online Banking Customers from Next-Generation Malware
sponsored by IronKey
WHITE PAPER: Cybercriminals are now using advanced malicious software (malware) to attack the computers of finance professionals in companies and government agencies. Read this paper now to learn how your business can stay protected from these threats.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

IronKey

Solving the Weakest Link in Network Security: Passwords
sponsored by DigitalPersona
WHITE PAPER: This paper proposes improving security and authentication by using biometrics. Included are real stories demonstrating how this approach solves the password management nightmare, addresses compliance regulations and eliminates password costs.
Posted: 15 May 2007 | Published: 01 May 2007

DigitalPersona

Credit Issuers: Stop Application Fraud At The Source With Device Reputation
sponsored by iovation, Inc.
WHITE PAPER: Read this white paper to learn about new and innovative techniques and solutions can be used to combat fraud, and how you can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within your fraud prevention process.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement