Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Data Theft

RSS Feed    Add to Google    Add to My Yahoo!
Data Theft White Papers (View All Report Types)
 
8 Best Practices for Securing Enterprise Data Sources and Achieving Compliance
sponsored by IBM
WHITE PAPER: This informative white paper explains why organizations need to adopt a more proactive, systematic approach to securing sensitive data and addressing compliance requirements amid the digital information explosion.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

Internet Trust Marks: Building Confidence and Profit Online
sponsored by Symantec Corporation
WHITE PAPER: This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Posted: 14 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

What is an Identity Provider and Why Do I Need to Become One
sponsored by SecureAuth
WHITE PAPER: This white paper addresses the reasons enterprises should become Identity Providers (IdPs), what becoming an IdP involves, and why you should consider automating this process as much as possible.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth

The business impact of data security regulations: Featuring Massachusetts
sponsored by Sophos, Inc.
WHITE PAPER: This article discusses some aspects of a new regulation -- 201 CMR 17:00 -- and offers suggestions on how data security best practices can help with compliance. Companies should discuss the regulation in detail with their legal consul to examine how it affects their unique circumstances and the best course of action to be taken.
Posted: 11 Aug 2009 | Published: 11 Jun 2009

Sophos, Inc.

Credit Issuers: Stop Application Fraud At The Source With Device Reputation
sponsored by iovation, Inc.
WHITE PAPER: Read this white paper to learn about new and innovative techniques and solutions can be used to combat fraud, and how you can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within your fraud prevention process.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

Examining SSL-encrypted Communications
sponsored by Netronome Systems
WHITE PAPER: SSL-encrypted communications have enabled a variety of secure, web-based communications and online transactions. This paper explores the drivers behind the increase in SSL usage and the methods used to confront the security challenges that SSL creates.
Posted: 26 Oct 2007 | Published: 16 Oct 2007

Netronome Systems

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

Pod Slurping - An Easy Technique for Stealing Data
sponsored by GFI Software
WHITE PAPER: In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
Posted: 18 Sep 2006 | Published: 18 Sep 2006

GFI Software

Security Assertion Markup Language (SAML) - the Essential Guide
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper introduces identity federation and the predominant standard, Security Assertion Markup Language, or SAML, to a non-technical audience. Describes why standards like SAML are necessary for implementing scalable, secure federated identity across organizational boundaries. And more!
Posted: 14 Sep 2011 | Published: 14 Sep 2011

Ping Identity Corporation

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
Posted: 30 Mar 2007 | Published: 01 Mar 2007

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement