Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Data Security Breaches

RSS Feed    Add to Google    Add to My Yahoo!
Data Security Breaches White Papers (View All Report Types)
 
Hacker Survey Report: The Flaws in IAM
sponsored by Thycotic
WHITE PAPER: In this white paper, examine the shocking truths about identity and access management (IAM) flaws and the war against hackers. Learn 4 steps to stronger privileged account management.
Posted: 04 Jan 2016 | Published: 30 Dec 2015

Thycotic

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER: This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor

How Can I Defend my Hybrid Enterprise From Data Breaches and Insider Threats?
sponsored by CA Technologies.
WHITE PAPER: This white paper teaches you how to effectively manage privileged access across on-premises, cloud, and hybrid environments. Read on to find out why perimeter defenses are failing and why IAM needs to be at the forefront of your security strategy.
Posted: 03 Feb 2016 | Published: 30 Dec 2015

CA Technologies.

Controlling High Fraud Risk of International Transactions iovation Reputation Services
sponsored by iovation, Inc.
WHITE PAPER: Iovation has pioneered a technology for online fraud screening. This white paper examines how e-Commerce businesses can fight online fraud without turning away business based on the geographic locations of customers.
Posted: 13 Oct 2008 | Published: 01 May 2007

iovation, Inc.

SonicWALL PCI Compliance Solution Brief
sponsored by SonicWALL
WHITE PAPER: The Payment Card Industry (PCI) Data Security Standard (DSS) applies to any organization that processes, transmits or stores payment card transactions or cardholder information. PCI applies not only to retailers but also to any business that accepts a single payment card transaction, no matter the size or industry.
Posted: 14 Feb 2011 | Published: 14 Feb 2011

SonicWALL

How Extended Validation SSL Brings Confidence to Online Sales and Transactions
sponsored by Symantec Website Security Solutions
WHITE PAPER: This white paper discusses the importance of increasing customer confidence in the security of online business transactions, and introduces Symantec Extended Validation SSL Certificates as a potential solution to this challenge.
Posted: 15 Jan 2015 | Published: 31 Oct 2013

Symantec Website Security Solutions

Security and Trust: The Backbone of Doing Business Over the Internet
sponsored by Symantec Website Security Solutions
WHITE PAPER: Carefully managing consumers' sensitive information is an essential part of online transactions. This informative resource helps you learn how you can gain the trust of your customers and keep their valuable information safe.
Posted: 25 Jul 2012 | Published: 25 Jul 2012

Symantec Website Security Solutions

Internet Trust Marks: Building Confidence and Profit Online
sponsored by Symantec Website Security Solutions
WHITE PAPER: This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Posted: 14 Jan 2015 | Published: 31 Oct 2013

Symantec Website Security Solutions

Internet-Scale Identity Systems: An Overview and Comparison
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides an overview of the key initiatives for Internet-scale identity systems and explores the similarities, differences, and synergies between them.
Posted: 20 Aug 2009 | Published: 03 Aug 2009

Ping Identity Corporation

Making the FACTA Red Flags Rules Operational
sponsored by RSA
WHITE PAPER: Read this paper to learn how technology can be leveraged to automate identity theft detection, prevention, and mitigation as part of your FACTA Red Flags compliance program.
Posted: 17 Oct 2008 | Published: 16 Oct 2008

RSA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement