As a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.
How will you defend your organization from the threats posed by mobile devices? This expert E-Guide will help you understand the tools and controls you should be implementing to maintain security and protect sensitive data.
Security is a top concern for businesses looking to implement a cloud computing environment throughout their systems. This white paper provides a comprehensive guide on building security in the cloud from the ground up so you can ensure your data and platforms are protected.
This white paper looks at the role of Certificate Authorities (CAs) in web security, including what measures a CA can take to promote trust in its certificates and the criteria to consider when choosing the best CA for the job.
While the importance of establishing the right IT systems and security policies have been expressed time and time again, a quick glance at the news headlines on data disasters reveal that not all organizations have a grasp on data leak protection. View this paper to explore some data loss incidents and the key leassons learned.
This expert e-guide explains how the limited scalability of source and target-based deduplication can lead to bottlenecks when large volumes of data are backed up. Learn how global deduplication can eliminate these bottlenecks through load balancing and get examples of these types of offerings in the marketplace.
This webcast explores how key management can help you overcome the data security challenges of cloud computing. Inside, discover the best practices for automating certificate management – click through to view now.
The start of many data security issues is, of course, the database. Here's a look at currently predominant types of database security vulnerabilities and how best to monitor database access to detect potential security incidents.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines