Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Security Breach

RSS Feed    Add to Google    Add to My Yahoo!
Security Breach Reports
 
8 Best Practices for Securing Enterprise Data Sources and Achieving Compliance
sponsored by IBM
WHITE PAPER: This informative white paper explains why organizations need to adopt a more proactive, systematic approach to securing sensitive data and addressing compliance requirements amid the digital information explosion.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

Mobile Security Strategies
sponsored by ComputerWeekly.com
ANALYST REPORT: This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

ComputerWeekly.com

Internet-Scale Identity Systems:An Overview and Comparison
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.
Posted: 27 Mar 2014 | Published: 04 Mar 2014

Ping Identity Corporation

DigitalPersona Pro
sponsored by DigitalPersona
SOFTWARE DEMO: This free product demo shows how DigitalPersona Pro can provide your company with biometric authentication for secure single sign-on.
Posted: 15 May 2007 | Premiered: 01 Jan 2006

DigitalPersona

An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On
sponsored by Ping Identity Corporation
VIDEOCAST: Check out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.
Posted: 11 Aug 2009 | Premiered: Aug 11, 2009

Ping Identity Corporation

Internet-Scale Identity Systems: An Overview and Comparison
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides an overview of the key initiatives for Internet-scale identity systems and explores the similarities, differences, and synergies between them.
Posted: 20 Aug 2009 | Published: 03 Aug 2009

Ping Identity Corporation

Security Assertion Markup Language (SAML) - the Essential Guide
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper introduces identity federation and the predominant standard, Security Assertion Markup Language, or SAML, to a non-technical audience. Describes why standards like SAML are necessary for implementing scalable, secure federated identity across organizational boundaries. And more!
Posted: 14 Sep 2011 | Published: 14 Sep 2011

Ping Identity Corporation

Making the FACTA Red Flags Rules Operational
sponsored by RSA
WHITE PAPER: Read this paper to learn how technology can be leveraged to automate identity theft detection, prevention, and mitigation as part of your FACTA Red Flags compliance program.
Posted: 17 Oct 2008 | Published: 16 Oct 2008

RSA

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER: This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor

Data Breaches in the US
sponsored by Quantum Corporation
ASSESSMENT TOOL: Learn the specifics of how, what and when data breaches occur in the United States by viewing this sales tool. Discover how much data was compromised by lost backup tapes, computer theft and lockbox theft from various organizations like health insurance companies, banks and federal departments.
Posted: 08 Oct 2009 | Published: 01 Jul 2009

Quantum Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement