Standards  >  

Security Standards

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P3P, Security Protocols, Information Security Standards
DEFINITION: P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements. P3P includes a machine-readable vocabulary and syntax that can be used to describe Web site security policies and consumers' self-identified privacy preferences. When a user requests a Web page, that Web site's P3P policy files are sent to the  … 
Definition continues below.
Security Standards Reports
51 - 75 of 541 Matches Previous Page  |  Next Page
6 Tips to Get Your Appsec Program Bigger and Better Than Ever
sponsored by Veracode, Inc.
WHITE PAPER: Discover 6 tips that can help you create an ongoing, comprehensive application security program and mitigate the risk of using third part app components.
Posted: 10 May 2017 | Published: 10 May 2017

Veracode, Inc.

How Open Code Components Increasing Speed, But Also Risk
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to handle the risk of open source components being used in the software that your organization uses, builds, and sells.
Posted: 10 May 2017 | Published: 10 May 2017

Veracode, Inc.

Expert Insight: AI, Machine Learning, and Non-Malware Attacks
sponsored by Carbon Black
WHITE PAPER: See the results of over 400 experts weighing in on artificial intelligence, machine learning, and non-malware attacks.
Posted: 09 May 2017 | Published: 09 May 2017

Carbon Black

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: Discover a detailed showcase of the 3 steps on the path to building up your organization's application security maturity.
Posted: 09 May 2017 | Published: 09 May 2017

Veracode, Inc.

Threat Hunting For Dummies
sponsored by Carbon Black
EBOOK: It's time to get proactive with threat hunting. In this Threat Hunting for Dummies e-book learn how to optimize your tools for endpoint visibility and threat intelligence and uncover 10 tips for creating effective threat hunting strategies.
Posted: 09 May 2017 | Published: 08 May 2017

Carbon Black

Application Security Program Checklist
sponsored by Veracode, Inc.
WHITE PAPER: Discover a step-by-step rundown of what you need to know to implement an advanced application security program successfully.
Posted: 09 May 2017 | Published: 09 May 2017

Veracode, Inc.

Unmasking Subdomain Abuse: How to Protect Against These Stealth Attacks
sponsored by Farsight Security
TRANSCRIPT: Discover how cyber-criminals are increasingly using both legitimate as well as malicious subdomains to gain entry into networks and commit other cyber-crime.
Posted: 08 May 2017 | Published: 03 Feb 2017

Farsight Security

Cybersecurity: Turning Threat Data Into Threat Intelligence
sponsored by Farsight Security
WHITE PAPER: Learn how real-time DNS observations improve the accuracy and response time to cyberattacks and how to use passive DNS to escalate the discovery and accelerate the investigative timeline.
Posted: 08 May 2017 | Published: 08 May 2017

Farsight Security

Not All Machine Learning Is Created Equal
sponsored by Cylance
WHITE PAPER: Discover how to apply machine learning to your organization's endpoint security and achieve unprecedented efficacy rates, minimal consumption of system resources, exceptional attack prevention speed, and more.
Posted: 08 May 2017 | Published: 08 May 2017

Cylance

The ROI of Modern Endpoint Security
sponsored by Cylance
WHITE PAPER: In this Forrester report discover a framework to evaluate the potential financial impact and ROI of advanced endpoint security solutions.
Posted: 08 May 2017 | Published: 08 May 2017

Cylance

Navigating the NY Dep. of Financial Services' Cybersecurity Regulations
sponsored by Veracode, Inc.
WHITE PAPER: Discover the 5 minimum requirements for NYDFS compliant cybersecurity programs, and what it means that these regulations require each company to assess its specific risk profile and design a program that addresses its risks in a "robust" fashion.
Posted: 08 May 2017 | Published: 08 May 2017

Veracode, Inc.

Combating the Top 4 Sources of Vulnerabilities
sponsored by Veracode, Inc.
WHITE PAPER: Vulnerability software is leading to security breaches. Learn how to combat the top four sources of application software vulnerabilities.
Posted: 08 May 2017 | Published: 08 May 2017

Veracode, Inc.

Advanced Threat Prevention: 6 Vendors go Head to Head
sponsored by Cylance
RESEARCH CONTENT: See the results of an advanced threat prevention test of enterprise endpoint protection software where 6 competitor endpoint products – Cylance, Kaspersky, McAfee, Sophos, Symantec and Trend Micro – go head-to-head in 4 performance areas.
Posted: 05 May 2017 | Published: 02 Feb 2017

Cylance

Enhance Data Protection with Analytics and Insights
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Learn how to maintain an agile data protection strategy that allows you to adapt to fast-changing markets, organizational demands, and the new demands of acquisitions.
Posted: 05 May 2017 | Published: 05 May 2017

Hewlett Packard Enterprise

Soaring to Success: Secure Mobility at 40,000ft
sponsored by Wandera
CASE STUDY: Discover the story of how one airline transformed its approach to corporate mobility, adopting new secure technologies and processes and delivering a new program with demonstrable return on investment.
Posted: 05 May 2017 | Published: 05 May 2017

Wandera

Identifying the Timeline Activities of a Cyber Breach
sponsored by Farsight Security
CASE STUDY: In this case study discover how the use of DNSDB in mapping malicious and benign infrastructure revealed the timeline and activity of a breach of the Anthem Healthcare System.
Posted: 05 May 2017 | Published: 05 May 2017

Farsight Security

5 Steps to Secure Azure Workloads
sponsored by Microsoft
RESOURCE: Discover 5 steps on how to secure your data on Microsoft Azure and enjoy the benefits of the cloud while trusting that your workloads are protected.
Posted: 05 May 2017 | Published: 05 May 2017

Microsoft

SPLUNK® SOFTWARE AS A SIEM
sponsored by Splunk
WHITE PAPER: Learn a new approach to SIEM that will give your organization the ability to combat the modern threat landscape and secure its data, all from a single pane of glass.
Posted: 04 May 2017 | Published: 04 May 2017

Splunk

Comparing Top Shelf Email Encryption Software Products
sponsored by Hewlett Packard Enterprise
EGUIDE: Access this expert e-guide to learn how the top of the line email encryption software measures up to one another. Find out what to look for when it comes to strength of cryptography, file security, mobile device support, and more.
Posted: 04 May 2017 | Published: 28 Apr 2017

Hewlett Packard Enterprise

Your Guide to Content Filtering for Mobile
sponsored by Wandera
WHITE PAPER: Explore the benefits of content filtering and analyze the challenges, questions and considerations involved in the implementation of content filtering across a mobile fleet.
Posted: 04 May 2017 | Published: 04 May 2017

Wandera

6 Vendor Risk Assessment Resource Drains to Avoid
sponsored by Rsam
WHITE PAPER: Discover 6 ways your organization may be allocating resources unnecessarily in remediating vendor risk.
Posted: 04 May 2017 | Published: 04 May 2017

Rsam

10 Things You Need to Know About Ransomware
sponsored by Cylance
WHITE PAPER: As threatening as ransomware sounds, damage can be avoided with increased user awareness coupled with the right security practices. In this resource uncover the 10 facts your organization should know about ransomware.
Posted: 03 May 2017 | Published: 03 May 2017

Cylance

Five Tips For Your GRC Risk Scoring System
sponsored by Rsam
WHITE PAPER: Discover 5 tips to improve your enterprise's governance, risk and compliance scoring system so that you can standardize reporting, streamline workflows, communicate risk clearly to stakeholders and more.
Posted: 03 May 2017 | Published: 03 May 2017

Rsam

Security Use Case Detecting Unknown Malware
sponsored by Splunk
WHITE PAPER: Learn how to gain significant power over understanding detailed activities on endpoint as well as the ability to detect advanced and unknown malware activities.
Posted: 03 May 2017 | Published: 03 May 2017

Splunk

Hunting ELFs: An investigation into Android malware detection
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis series demonstrates how malicious Linux files, known as ELFs, can be detected on Android phones.
Posted: 10 May 2017 | Published: 10 May 2017

ComputerWeekly.com
51 - 75 of 541 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY STANDARDS DEFINITION (continued): … P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements. P3P includes a machine-readable vocabulary and syntax that can be used to describe Web site security policies and consumers' self-identified privacy preferences. When a user requests a Web page, that Web site's P3P policy files are sent to the browser, which compares the files with the user's privacy preferences and delivers an alert if there is a conflict between the two. P3P was developed by the World Wide Web Consortium (W3C) as a means of increasing consumer confidence in online transactions.
Security Standards definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement