Standards  >   Security Standards  >  

Data Encryption Standards

RSS Feed    Add to Google    Add to My Yahoo!
Data Encryption Standards Reports
 
De-risking IT Lifecycle Management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

Network Encryption and its Impact on Enterprise Security
sponsored by Blue Coat Systems
WHITE PAPER: This white paper explores why SSL/TSL decryption and inspection methodologies are being abandoned in favor of more strategic approaches. View now to learn the three crucial characteristics of and how to improve the resiliency and performance of your network security strategy.
Posted: 06 Apr 2015 | Published: 11 Feb 2015

Blue Coat Systems

The Truth About Data-At-Rest Encryption & the Cloud
sponsored by FireHost Inc.
WHITE PAPER: This white paper explains why some methods of encryption are weaker than others and suggests ways to implement the strongest encryption standards for your data-at-rest.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

FireHost Inc.

8 Security Issues to Avoid in Mobile App Development
sponsored by Kony
WHITE PAPER: This resource divulges the top 8 security issues that app developers need to watch in order to protect their users from phishing, malware, and more.
Posted: 22 Jul 2015 | Published: 22 Jul 2015

Kony

Sharing knowledge to tackle online banking fraud
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Detecting the use of TrueCrypt
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of TrueCrypt data encryption.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

ComputerWeekly.com

HIPAA Violations Incur Multi-Million Dollar Penalties
sponsored by Absolute Software
WHITE PAPER: In this resource, read about some recent HIPAA breaches that cost the violating parties significant penalties and learn about the measures that can be put in place to help maintain compliance.
Posted: 21 Jan 2014 | Published: 15 Jan 2013

Absolute Software

A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE: Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013

Dell KACE

Enabling High Performance for Apple iPads in the Enterprise
sponsored by Aruba Networks
WHITE PAPER: Learn how you can integrate iPads into your wireless LAN, facilitating the adoption of tablets into your workplace. Start delivering scalable performance for all mobile devices, helping you create an on-demand, always available enterprise.
Posted: 30 May 2012 | Published: 20 Sep 2011

Aruba Networks

Technical Guide on Windows Security
sponsored by SearchSecurity.com
EGUIDE: SearchSecurity.com presents a comprehensive guide to Windows security. Our experts help you discover all of the security enhancements made to Windows 7, including BitLocker, AppLocker, DirectAccess and the Win7 Firewall. You’ll learn how to use these tools to help your organization better manage your Windows security efforts.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement