The Growing Need for Self-Encrypting Drives
By: Micron Technology View more from Micron Technology >>
Download this next:
2 types of endpoint encryption to protect data
By: TechTarget ComputerWeekly.com
Type: Infographic
Encryption is the key layer in any data security strategy as it ensures data cannot be read by unauthorized users. Even if multiple layers of protection fail or are breached, encrypted data stays protected.
Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.
These are also closely related to: "The Growing Need for Self-Encrypting Drives"
-
Cloud computing storage key management
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Advances in technology in a commercial market have changed the shape of the traditional cloud concepts. Cloud computing has been of commercial interest not only because it offers cost-effective services, but also the easy adaptation of new technology.
Many cloud services have advertised the high security of cloud data; however, consumers have limited access to operability in the cloud. The growth of interconnected networks has also increased the security threats on the data.
Key management between an organisation and its data stored in the cloud infrastructure is one of the biggest challenges in achieving the assurance of the integrity and confidentiality of cloud data.
-
E-Book: New Enterprise Desktop Chapter 3: Windows 7 Security: Strengths and Weaknesses
By: TechTarget Data Center
Type: eBook
Each new OS is touted as the “Holy Grail” of features that every IT pro has been waiting for. Windows 7 is no different. Microsoft promised a breadth of new security features with this release, but are they all as good as they sound? This chapter looks at the Windows 7 security features such as BitLocker and Action Center, and separates those that really count from those that sound better on paper.
Find more content like what you just read:
-
Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week’s Computer Weekly, our latest Buyer's Guide examines best practice in desktop virtualisation. We ask if a six-year-old technology could be a key to tackling IT security threats. And we look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Read the issue now.
-
Defining "evil maid" attacks, how to stop them
By: Dimension Data
Type: eGuide
In this e-guide learn why the traditionally accepted full disk encryption (FDE) isn't enough to protect enterprise data in case an attacker steals your device.
-
How Consumerization Affects Security and Compliance
By: TechTarget Security
Type: EBRIEF
The trend of consumerization is changing the way your employees and organization work, but is also affecting security and compliance. A number of new issues are emerging because of this trend, but with adequate monitoring and policies to protect corporate data, you can protect your crown jewels.
-
Mobile Data Security and Compliance Challenges in the Enterprises
By: TechTarget Security
Type: eGuide
The bring your own device (BYOD) era has ushered in a number of benefits and security challenges alike. In this E-Guide from SearchConsumerization.com, learn about the top mobile data security and compliance challenges and the best ways you can conquer them.
-
Learn application security in a practical way
By: VMware Tanzu
Type: eBook
Application security is a hot topic in the digital-first era. Developers today face more cyber threats than ever before. Because of that, it is critical that all developers continue to enhance their skillset. For those developers who want to learn more about app security, but in a practical way, this eBook is what you need. Read on to learn more.
-
Securing the perimeter-less network with increased visibility
By: Fortinet, Inc.
Type: Product Overview
With the death of the network perimeter, cybercriminals have proven that every asset is a potential entry point for an attack. FortiGate Next-Generation Firewalls
-
A Security Assessment of Android Full-disk Encryption
By: TechTarget ComputerWeekly.com
Type: eGuide
This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
-
A Computer Weekly buyer's guide to perimeterless network security
By: TechTarget ComputerWeekly.com
Type: eGuide
Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
-
7 NAS encryption best practices to protect data
By: TechTarget ComputerWeekly.com
Type: eBook
NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.
-
The exploitation of flaws in the HTTPS protocol
By: TechTarget ComputerWeekly.com
Type: Research Content
For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
-
Buyer’s guide to ransomware resilience
By: WatchGuard Technologies, Inc.
Type: White Paper
On average it takes 3.5 weeks for an organization to recover their operations after a ransomware attack. Can your organization afford such a setback? This white paper presents an in-depth buyer’s guide to ransomware resilience, highlighting the key criteria you need to look for in a potential offering. Read on to learn more.
-
Security and efficiency with entry-level hardware security modules (HSMs)
By: Utimaco
Type: Product Overview
Security is often constrained by limited resources, but with entry level hardware security modules (HSMs), tailored to function seamlessly within these limitations, security doesn’t have to come at the expense of efficiency. Unlock Utimaco’s catalogue of offerings and find the HSM that’s right for your organization.
-
How to use a public key and private key in digital signatures
By: TechTarget ComputerWeekly.com
Type: eGuide
Ensuring authenticity of online communications is critical to conduct business. Learn how to use a public key and private key in digital signatures to manage electronic documents.
-
Views from the c-suite: why endpoint management is more critical than ever before
By: Tanium
Type: White Paper
What were once your successful defense strategies have been outpaced by advancements in cyberthreats, leaving your endpoints vulnerable to attacks. So, how can you strengthen your endpoint security? By setting in motion 10 strategies for endpoint management. Dig into this white paper to unlock them.
-
SWG: Answering FAQs
By: Nomios
Type: eBook
To battle proliferating web-based threats, many organizations have adopted a secure web gateway (SWG) in order to filter malicious content. For leaders interested in augmenting their SWG knowledge, this e-book can serve as a comprehensive guide. Tap into the book to unlock answers to FAQs about SWGs.
-
CW ANZ - December 2018: Rise to cloud and data management challenges
By: TechTarget ComputerWeekly.com
Type: Ezine
In this edition of CW ANZ, we look at how enterprises in ANZ are approaching data management in the cloud, and some of the best practices that they can adopt to address cloud related challenges.
-
Secure Voting
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
-
Mobile Device Security Best Practices for BYOD
By: TechTarget Security
Type: eGuide
This expert E-Guide from SearchMobileComputing.com explores the issue of mobile device security and offers best practices for making a BYOD program work in your organization.
-
Securing Data, Not Endpoints: The Best Way to Control Consumerization
By: TechTarget Security
Type: eGuide
Discover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.
-
Is your infrastructure orchestration platform secure?
By: Orchestral.ai
Type: Product Overview
Because infrastructure orchestration platforms have access to data and configurations throughout a network, organizations must ensure that these platforms are secure. To learn about four key security components of such a platform, take a look through this overview.
-
Infographic: 4 types of ransomware
By: TechTarget ComputerWeekly.com
Type: Infographic
Ransomware is one of the most effective strategies for attacking critical infrastructures. This type of malware infects computers and prohibits or severely restricts users from accessing entire systems until ransom demands have been met. In this infographic, we take a look at the four types of ransomware and their effect on the security landscape.
-
eGuide: Expert Tips for Deploying Secure Messaging Technologies
By: TechTarget Security
Type: White Paper
This eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.
-
Jargon Buster Guide to Post Quantum Cryptography
By: TechTarget ComputerWeekly.com
Type: eGuide
This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.
-
Technical guide on Web Security Gateways
By: TechTarget Security
Type: eBook
Malicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats.
-
A Computer Weekly buyer's guide to optimising storage
By: TechTarget ComputerWeekly.com
Type: eGuide
The implementation of effective storage optimisation has becomean important factor in business. In this 12-page buyer's guide,Computer Weekly looks at cost implications, the hyper-convergedinfrastructure minefield and the alternatives to shared storage
-
8 secure file transfer services for the enterprise
By: TechTarget ComputerWeekly.com
Type: eGuide
Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.
-
Digital secure remote payment: How Apple Pay can change the future of remote payments
By: TechTarget ComputerWeekly.com
Type: Research Content
Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.
-
Essential Guide: Securing hybrid IT infrastructure
By: TechTarget ComputerWeekly.com
Type: Essential Guide
In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.
-
MicroScope – October 2020: Get in touch with remote network security
By: MicroScope
Type: Ezine
In this issue, find out how the security channel has been working to ensure the network safety of remote workers during the pandemic. Also read about how flash-based storage is being enhanced to include ground-breaking technology using helium and DNA, and discover how data is the key to encryption
-
Focus: IT Security in the Middle East
By: TechTarget ComputerWeekly.com
Type: eGuide
In this issue, we look at the challenges facing organisations in the Middle East as they increasingly rely on digital technologies to engage with customers and citizens.We also analyse specific risks to enterprises, such as malware sneaking into networks under the guise of encryption.
-
Why deep visibility is essential to stopping cyberthreats
By: Gigamon
Type: Infographic
In the current threat landscape, deep observability is essential for security teams looking to secure lateral movement over encrypted channels. This infographic contrasts the differences in potential threat detection with and without plaintext visibility from Precryption. Download now to learn more.
-
Preventing identity theft in a data breach
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
-
Desktop Admin for BYOD: Security Chapter
By: TechTarget Security
Type: White Paper
The risk presented by BYOD should not prevent companies from taking advantage of its benefits, including flexibility and cost savings. Inside, learn how to clearly define your BYOD security strategy and get the most out of this trend.
-
Surviving Ransomware: What You Need to Know
By: Palo Alto Networks
Type: White Paper
Ransomware attacks dominate headlines in a seemingly endless parade of compromises in numerous sectors. From Trojan.Gpcoder, the first modern ransomware exploit, to high-profile hits on Colonial Pipeline, it’s becoming clear that security practitioners are up against formidable foes. Read this white paper to learn how to survive ransomware.
-
Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
By: TechTarget Security
Type: eGuide
This expert e-guide explores how trusted and forged SSL certificates work, as well as the dangers that arise from compromised Certification Authorities (CAs). Discover what you need to know about the state of the digital marketplace today – read on to learn more.
-
Endpoint and antimalware protection for small to large businesses
By: Carbon Black
Type: eGuide
Picking a security platform can be difficult. Inside this e-guide, expert Ed Tittel explores strategies and criteria to ensure you are picking the most successful security platform for your company.
-
Data Center & Hybrid Cloud Security
By: Palo Alto Networks
Type: eBook
Data Center & Hybrid Cloud Security helps you rethink your approach to security to better protect your data and workload in the on-premises data center and across multi-cloud environments. Download the 83-page chapter book today.
-
Technical Guide on Mobile Security
By: TechTarget Security
Type: eGuide
Techtarget's Security Media Group presents a comprehensive guide to mobile device security. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on the issue.
-
The automobile root of trust for device attestation and data security
By: Utimaco
Type: White Paper
As automobile development becomes increasingly complex, the potential vulnerability and threat landscape also grows. This white paper further explores the complexities of automobile compliance, advocating for car manufacturers to apply a zero-trust approach to take device attestation and data security seriously. Read on to learn more.
-
Computer Weekly – 13 November 2018: Will the $34bn IBM-Red Hat mega-merger succeed?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.
-
Email security: Never more important
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
-
Combatting the spread of unstructured data
By: Panzura
Type: White Paper
The tendency for organizations to continue using legacy storage systems to manage escalating data volumes has resulted in the prevalence of unstructured data.CloudFS is designed to transform complex, multicomponent, and often multi-vendor environments into a simplified data management solution. Download now to learn more.
-
Ransomware threats, behavior & costs in 2022
By: Palo Alto Networks
Type: Analyst Report
Between DoS attacks, ransomware as a service (RaaS), and double-extortion, hackers are becoming more resourceful with their ransomware campaigns. This report looks at the state of ransomware, analyzing how the landscape has evolved in recent years, and what strategies and opportunities there are for overcoming it. Read on to learn more.
-
What is Third-Party Maintenance in the data center?
By: Service Express
Type: White Paper
Third-party maintenance can give back control of your equipment life cycle, reduce long-term maintenance costs, and help maximize data center investments. Inside, learn how to accurately weigh the pros and cons of switching away from traditional OEM support.
-
Shedding Light on OEM Storage Support
By: Service Express
Type: White Paper
If you are being strong-armed into replacing your current storage with the newest equipment, remember that the “one-option-only” perception is just an illusion. Access this white paper to learn 6 must-know facts before your next storage buy.
-
Beating web application security threats
By: TechTarget Security
Type: eGuide
Application security plays an important role in ensuring the accuracy and confidentiality of data, yet at times teams may fear that security can interfere with overall performance. Read this e-book for tips that discuss the value of application security and explain how to implement it to ensure the highest availability and usability.
-
Expert recommendations for addressing the spike in extortion
By: Palo Alto Networks Unit42
Type: eBook
Although recovering from offline backups can provide some protection against encryption-only ransomware attacks, organizations must take additional measures to prepare for threat actors who extort victims. Browse a detailed view of the observations of Unit42 and discover expert recommendations for addressing them.