Standards  >   Security Standards  >   Encryption Standards  >   Data Encryption Standard  >  

Digital Signature Standards

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: DSS (Digital Signature Standards)
DEFINITION: Digital Signature Standard (DSS) is the digital signature algorithm (DSA) developed by the U.S. National Security Agency (NSA) to generate a digital signature for the authentication of electronic documents. DSS was put forth by the National Institute of Standards and Technology (NIST) in 1994, and has become the United States government standard for authentication of electronic documents.  … 
Definition continues below.
Digital Signature Standards Reports
101 - 125 of 559 Matches Previous Page  |  Next Page
Cloud Security Spotlight Report
sponsored by Palerra Inc.
WHITE PAPER: This comprehensive research report explores the specific drivers and risk factors of cloud infrastructure, how organizations are using the cloud, whether the promise of the cloud is living up to the hype, and how organizations are responding to the security threats in these environments.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Palerra Inc.

Comparison Guide Email Encryption
sponsored by ZixCorp
WHITE PAPER: Many businesses choose Office 365, a known, trusted name in email and email encryption. Fact is, Office 365 is objectively not the easiest to incorporate into business life when compared to the competition. Discover the comparison yourself in this white paper and reevaluate your organization's email solution.
Posted: 01 Jun 2016 | Published: 01 May 2016

ZixCorp

Compliance and Cloud Security eBook
sponsored by SearchSecurity.com
EBOOK: SearchSecurity.com presents a comprehensive guide to compliance and cloud security. Our experts cover all the angles in order to help clarify security and compliance issues associated with cloud computing.
Posted: 19 Jul 2011 | Published: 19 Jul 2011

SearchSecurity.com

Comprehensive Protection from Advanced Threats Requires Mobile Threat Assessment
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover how a mobile threat assessment strategy can provide comprehensive protection against the most vicious and perfidious mobile attacks. Also learn of the myriad attack vectors that threaten mobile devices today, employee involvement in protection, and more.
Posted: 11 Jul 2016 | Published: 31 Mar 2016

Check Point Software Technologies Ltd.

Conquering the Cloud: Top Security Issues and Keeping Hackers at Bay
sponsored by TrendMicro
EGUIDE: In this e-guide, discover two articles that detail the top security issues of the cloud and offer strategies on how to keep malicious hackers at bay.
Posted: 18 Aug 2016 | Published: 11 Aug 2016

TrendMicro

Consider the Whole Picture When Moving Your Network to the Cloud
sponsored by Dimension Data
WHITE PAPER: Access this white paper to find out why network and application performance during your transition to the cloud are tough to maintain for businesses.
Posted: 03 Mar 2015 | Published: 31 Dec 2014

Dimension Data

Covering the Security Aspect of Software Asset Management
sponsored by Snow Software
WHITE PAPER: Managing large amounts of business critical information requires a high level of security. Access this white paper and uncover critical features in software asset management that prevent unauthorized access and destructive attacks.
Posted: 14 Mar 2016 | Published: 09 Dec 2015

Snow Software

Customize Email Security in a Private Cloud
sponsored by Intermedia
WHITE PAPER: Learn what managed public cloud, private cloud and hybrid cloud models can do for your organization's email security – as well as the criteria for choosing the one that's right for you. Access now to specifically uncover the benefits of a Dedicated Hosted Exchange.
Posted: 02 Sep 2016 | Published: 02 Sep 2016

Intermedia

CW Special report on Symantec
sponsored by ComputerWeekly.com
WHITE PAPER: This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.
Posted: 14 May 2013 | Published: 14 May 2013

ComputerWeekly.com

Cloud Security Designed for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
Posted: 19 May 2014 | Published: 19 May 2014

Trend Micro

Cloud Security: Built from the Ground Up
sponsored by Intel
VIDEO: Cloud computing offers the promise of much greater efficiency, flexibility and more simplified datacenters, but it also presents new data security challenges. Learn how executives from Terremark, VMware, and Intel view the challenges and how cloud security technology built into hardware provides the most robust protection to platforms and data.
Posted: 07 Apr 2011 | Premiered: 22 Feb 2011

Intel

Cloud-Stored Offsite Database Backups
sponsored by Oracle Corporation
WHITE PAPER: Cloud backups are the right protection for databases running within the compute Cloud. Read this white paper to learn about how Cloud storage can be a benefit to your organization.
Posted: 06 Oct 2010 | Published: 17 May 2010

Oracle Corporation

Compare Windows 8 and Windows® XP Security Problems
sponsored by Lenovo and Microsoft
WHITE PAPER: This white paper explains the most critical security-related differences between Windows® XP and Windows 8, including each operating system’s ability to provision security patches, integrate with MDM and more.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Lenovo and Microsoft

Compliance Driven Security
sponsored by Dell, Inc.
WHITE PAPER: With the increasing threat to credit card data, the Payment Card Industry Data Security Standard (PCI DSS) was introduced, requiring organizations to implement information security controls. Access this resource to learn more about the existing threats, the key benefits of PCI compliance and how to effectively implement a PCI compliance program.
Posted: 18 Jun 2012 | Published: 18 Jun 2012

Dell, Inc.

Compliance Policy Management: Continuous Compliance with Tripwire Enterprise
sponsored by Tripwire, Inc.
DATA SHEET: Improperly configured physical and virtual IT infrastructure is the leading cause of security breaches. As a result, organizations are subject to an increasing number of complex regulations or standards designed to secure the IT infrastructure.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

Tripwire, Inc.

Compliance strategies for greater cyber security policies
sponsored by HP Enterprise Security
EGUIDE: Access this expert e-guide to learn compliance strategies for greater cyber security policies. Find out why the best security strategy is a solid, prevention-focused internal security policy, how crafting your audit kit before compiling compliance procedures leads to more passed audits, and more.
Posted: 05 Jun 2012 | Published: 01 Jun 2012

HP Enterprise Security

Computer Weekly - 3 April 2012: Data security best practice
sponsored by ComputerWeekly.com
EZINE: This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project.
Posted: 02 Apr 2012 | Published: 03 Apr 2012

ComputerWeekly.com

Computer Weekly – 10 June 2014: The case for a European cloud market
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the European Commission wants to create a digital single market in Europe based on industry standard clouds – but is the plan realistic? Network encryption promises to solve many IT security threats – we examine the benefits. And our latest buyer's guide looks at business process management. Read the issue now.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

ComputerWeekly.com

Computer Weekly – 2 April 2013: The benefits of context-aware security
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at context-aware security – a next generation technology that promises to improve corporate information security. As banks implement more short-term fixes to cope with new regulations, we assess the IT implications. And we examine the benefits of executive coaching for CIOs. Read the issue now.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

ComputerWeekly.com

Continuous Cyber Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This informative paper takes an in-depth look at continuous monitoring, describing how you can successfully deploy the technology and how it can increase visibility and streamline your security management.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

Lumeta Corporation

Control SSL to Prevent Attacks & Information Leaks
sponsored by BlueCoat
DATA SHEET: By providing SSL visibility and control, Blue Coat offers a complete data leakage solution with its ProxySG family of secure proxy appliances. Blue Coat ProxySG solution protects against a wide range of risks, regardless of whether the traffic is encrypted.
Posted: 11 May 2010 | Published: 11 May 2010

BlueCoat

Controlling, Delegating, Logging and Auditing Unix/Linux Root Actions
sponsored by BeyondTrust Corporation
PRODUCT LITERATURE: This document discusses the use of PowerBroker software to address some of the security and audit problems inherent in native UNIX and Linux operating systems. The purpose of the document is to demonstrate the value of PowerBroker as a tool for reducing risk in environments where information security and risk avoidance are considered important.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation

Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This white paper presents IBM and Ponemon Institute's 2015 Cost of Data Breach Study, and explains the 3 major reasons contributing to a higher cost of data breach in 2015. Read on here to access the key findings from the report.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

IBM

Creating an Effective Security Operations Function
sponsored by RSA
WHITE PAPER: Read this white paper to understand all the activities and roles in a security operations function - your first step in making those operations more effective and efficient.
Posted: 17 Oct 2008 | Published: 16 Oct 2008

RSA

Crypto Complete Case Study: Field-Level Encryption Helps Retail Chain Achieve PCI Compliance
sponsored by Linoma Software
CASE STUDY: In this case study, Love's Travel Stops and Country Stores, a retail chain, used Crypto Complete in an effort to meet PCI standards. Love's found that Crypto Complete encrypted credit card numbers in a way that satisfies PCI compliance auditors.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

Linoma Software
101 - 125 of 559 Matches Previous Page    3 4 5 6 7 8    Next Page
 
DIGITAL SIGNATURE STANDARDS DEFINITION (continued): …  DSS is specified in Federal Information Processing Standard (FIPS) 186.DSA is a pair of large numbers that are computed according to the specified algorithm within parameters that enable the authentication of the signatory, and as a consequence, the integrity of the data attached. Digital signatures are generated through DSA, as well as verified. Signatures are generated in conjunction with the use of a private key; verification takes place in reference to a corresponding public key. Each signatory has their own paired public (assumed to be known to the general public) and private (known … 
Digital Signature Standards definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement