Standards  >   Security Standards  >   Encryption Standards  >   Data Encryption Standard  >  

Digital Signature Standards

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: DSS (Digital Signature Standards)
DEFINITION: Digital Signature Standard (DSS) is the digital signature algorithm (DSA) developed by the U.S. National Security Agency (NSA) to generate a digital signature for the authentication of electronic documents. DSS was put forth by the National Institute of Standards and Technology (NIST) in 1994, and has become the United States government standard for authentication of electronic documents.  … 
Definition continues below.
Digital Signature StandardsReports
226 - 250 of 355 Matches Previous Page  | Next Page
PCI DSS v3.0: How to Adapt your Compliance Strategy
sponsored by AlienVault
WEBCAST: With version 3.0 of PCI DSS now available, it's time to review your compliance strategy and make a plan for adapting to the revised requirements. View this webcast to learn more about the significant changes related to malware defenses, vulnerability assessments and penetration testing.
Posted: 20 Dec 2013 | Premiered: Dec 20, 2013

AlienVault

Printing: a false sense of security?
sponsored by ComputerWeekly.com
ANALYST REPORT: Louella Fernandes and Bob Tarzey show how secure printing technology can provide authentication, authorisation and accounting capabilities, helping businesses improve document security and meet compliance regulations.
Posted: 30 Aug 2013 | Published: 30 Aug 2013

ComputerWeekly.com

Reassessing DDoS - Lessons Learned
sponsored by Neustar®
PODCAST: This exclusive podcast discusses why your organization needs to reassess your DDoS protection strategy, discussing the latest waves of attacks and what they could evolve into.
Posted: 19 Mar 2014 | Premiered: Mar 19, 2014

Neustar®

PCI 101: A Beginner’s Guide to PCI DSS Compliance
sponsored by FireHost Inc.
WEBCAST: This webcast covers everything you need to know about the payment card industry data security standard.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014

FireHost Inc.

PCI Compliance Made Simple
sponsored by Alert Logic
WHITE PAPER: Major data breaches have caused untold damage. These unfortunate events have led to the creation of a data security standard (PCI DSS) that all payment card industry members must comply to. This white paper helps to simplify and provide a deeper understanding of the PCI DSS v1.1 and discusses best practices to achieve PCI compliance.
Posted: 20 Jul 2009 | Published: 20 Feb 2008

Alert Logic

PCI Council issues mobile application rules for software developers
sponsored by Hewlett-Packard Company
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Hewlett-Packard Company

PCI DSS: Next-Generation Data Security, Storage and Integrity
sponsored by SearchSecurity.com
EBOOK: SearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard.
Posted: 11 Oct 2010 | Published: 11 Oct 2010

SearchSecurity.com

PCI in the cloud: Compliance guide
sponsored by Intel
EGUIDE: Adhering to the requirements of the PCI DSS, especially in a cloud computing environment, is no easy task and unfortunately there is no one-size-fits all approach. This guide offers expert insight on PCI in the cloud as well as key guidance to help you navigate through the cloud to meet compliance goals.
Posted: 26 Apr 2012 | Published: 26 Apr 2012

Intel

PGP Encryption Platform - Delivering cost-effective, comprehensive encryption for enterprise data protection
sponsored by PGP Corporation
WHITE PAPER: The PGP Encryption Platform reduces the complexities of protecting business data by enabling organizations to deploy and manage multiple encryption applications cost-effectively. The PGP Encryption Platform makes installing additional systems unnecessary when organizational needs for encryption expand.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

PGP Corporation

PGP Whole Disk Encryption - Proactively secure confidential data on disks and removable media
sponsored by PGP Corporation
WHITE PAPER: PGP Whole Disk Encryption provides enterprises with comprehensive, nonstop disk encryption for Microsoft Windows and Apple Mac OS X, enabling quick, cost-effective protection for data on desktops, laptops, and removable media. The encrypted data is continuously safeguarded from unauthorized access, providing strong security.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

PGP Corporation

PGP Whole Disk Encryption Workgroup Edition - The full-disk encryption solution for small companies and workgroups
sponsored by PGP Corporation
WHITE PAPER: PGP Whole Disk Encryption Workgroup Edition is a comprehensive full-disk protection solution that provides industry-leading encryption for desktops, laptops, and USB devices with simple administration. With PGP Whole Disk Encryption Workgroup Edition, there are no servers or databases to configure and manage.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

PGP Corporation

Presentation Download: Data Protection Strategies: Data Encryption
sponsored by CDW Healthcare
PRESENTATION TRANSCRIPT: If data is encrypted, health care providers are not subject to new, strict data breach notification laws. Server, storage and network encryption adds yet another layer of protection. So why do so many organizations avoid encryption? This presentation download will cover the basics of encryption and explain why its benefits outweigh its costs.
Posted: 25 Oct 2011 | Published: 25 Oct 2011

CDW Healthcare

Presentation Transcript: Go Forth & Comply - New Virtualization Guidelines from the PCI Council
sponsored by Dell SecureWorks UK
PRESENTATION TRANSCRIPT: In this presentation transcript, principal security consultant at Dell SecureWorks, discuss the issues confronting organizations who wish to use virtualization technologies with their Cardholder Data Environment, summarize and clarify the recommendations from the PCI council and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks UK

Presentation Transcript: Helping to Reduce Compliance Costs for the UK Public Sector
sponsored by Dell SecureWorks UK
PRESENTATION TRANSCRIPT: Dell SecureWorks has vast experience in helping customers achieve successful audits against compliance standards. In this presentation trancript, Lee Lawson, Head of Security Testing and Response services with Dell SecureWorks, offers advice on how to maximize your budget.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks UK

Presentation Transcript: ISACA PCI Compliance Symposium
sponsored by Intel
PRESENTATION TRANSCRIPT: Organizations who handle credit card information must have a solid security strategy to protect their customer's sensitive data and meet the requirements of PCI DSS. Read this presentation transcript as Blake Dournaee offers insight into PCI DSS and key security practices to build and maintain a secure network through tokenization.
Posted: 19 May 2011 | Published: 19 May 2011

Intel

Presentation Transcript: Pragmatic Data Security
sponsored by Websense, Inc.
PRESENTATION TRANSCRIPT: This presentation transcript busts through hype, hyperbole, and complexity and details a pragmatic approach to information-centric security for nearly any organization. Read on to learn more.
Posted: 23 Mar 2010 | Published: 22 Mar 2010

Websense, Inc.

Presentation Transcript: The Changing Nature Of Cyber Crime, Attackers, Counter Measures and New Models For Defense In Depth
sponsored by ESET
PRESENTATION TRANSCRIPT: The threat environment has changed drastically in recent years. Threats are more complicated and attackers are part of organized groups seeking profit rather than fame. In this Presentation Transcript, Charles Kolodgy of IDC highlights some attackers' successes, countermeasures in risk reduction, and a new model for defense-in-depth.
Posted: 04 Dec 2009 | Published: 03 Dec 2009

ESET

Presentation Transcript: Vulnerability Scanning and Compliance
sponsored by Dell SecureWorks UK
PRESENTATION TRANSCRIPT: In this presentation transcript, Lee Lawson, Head of Security Testing and Response at Dell SecureWorks, explores vulnerability scanning drivers, pros and cons for different vulnerability scanning solutions, best fit solutions for specific regulatory compliance standards, and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks UK

Protect Your Data from Endpoint to the Cloud
sponsored by Trend Micro, Inc.
WHITE PAPER: Trend Micro Data Protection rises to the occasion with a robust solution that ensures the availability, integrity, and confidentiality of your business information. This comprehensive solution keeps your data safe from intentional or unintentional harm wherever it resides, protecting it against damage, loss, and unauthorized access. 
Posted: 22 Mar 2011 | Published: 21 Mar 2011

Trend Micro, Inc.

Protecting User from Firesheep and Sidejacking Attacks with SSL
sponsored by VeriSign EMEA
WHITE PAPER: This paper addresses the problems of unsecured Wi-Fi including recent security concerns such as the Firesheep and sidejacking, and how to protect against these attacks. Learn how public websites can provide security with TLS/SSL by not only harden against many attacks, but also assure users of that security.  
Posted: 29 Jul 2011 | Published: 29 Jul 2011

VeriSign EMEA

Quantum Encryption Solutions
sponsored by Quantum Corporation
PRODUCT OVERVIEW: Quantum Encryption Key Manager (Q-EKM) is an easy-to-use solution for protecting valuable data at rest across the enterprise.
Posted: 09 Jun 2008 | Published: 01 Jun 2008

Quantum Corporation

Realizing Asset-Centric and User-Centric Approaches to Security
sponsored by RES Software
WHITE PAPER: This white paper presents an overview of both the asset-centric and the user-centric approaches to security. These approaches will be mapped towards the standard for Information Security: ISO 17799.
Posted: 18 Sep 2009 | Published: 18 Sep 2009

RES Software

Recommended Best Security Practices for Unified Communications
sponsored by Polycom, Inc.
WHITE PAPER: Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective, it is very similar to other IP data services. This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
Posted: 07 Sep 2012 | Published: 30 Mar 2012

Polycom, Inc.

Reducing PCI DSS Scope with the First Data® TransArmor® Solution
sponsored by First Data Corporation
WHITE PAPER: Organizations who handle payment card data are obligated to comply with the Payment Card Industry Data Security Standard (PCI DSS). This whitepaper discusses how the TransArmor® solution can enable scope reduction, minimizing costs and effort of PCI compliance.
Posted: 15 Aug 2011 | Published: 15 Aug 2011

First Data Corporation

Reducing PCI DSS Scope: The Gateway Approach
sponsored by Intel
WHITE PAPER: This White Paper discusses how Intel SOA Expressway security gateway-generated tokens can replace card numbers with surrogates, removing systems from scope.
Posted: 04 Apr 2011 | Published: 31 Mar 2011

Intel
226 - 250 of 355 Matches Previous Page    8 9 10 11 12 13    Next Page
 
DIGITAL SIGNATURE STANDARDS DEFINITION (continued): …  DSS is specified in Federal Information Processing Standard (FIPS) 186.DSA is a pair of large numbers that are computed according to the specified algorithm within parameters that enable the authentication of the signatory, and as a consequence, the integrity of the data attached. Digital signatures are generated through DSA, as well as verified. Signatures are generated in conjunction with the use of a private key; verification takes place in reference to a corresponding public key. Each signatory has their own paired public (assumed to be known to the general public) and private (known … 
Digital Signature Standards definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement