Standards  >   Security Standards  >   Encryption Standards  >  

Block Cipher

RSS Feed   
Block Cipher Reports
 
Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

Success Story: EVONIK INDUSTRIES
sponsored by SNP Transformation
CASE STUDY: For Evonik, a global chemicals company, balancing a growing list of compliance mandates with data protection and employee productivity is a difficult task. Read this case study to see why they partnered with SNP to address these challenges and discover the outcomes of this initiative.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

SNP Transformation

Atakama’s File Encryption Will Prevent Ransomware Exfiltration Threats
sponsored by Atakama
RESOURCE: Ransomware attacks have escalated in recent years to include newer, more devious techniques, like file exfiltration. This article looks at why ransomware is escalating and offers best practices for protecting your organizations from these attacks – read on to get started.
Posted: 09 Dec 2020 | Published: 16 Jun 2020

Atakama

Cyber Security: 2021 Worst in Show
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 08 Oct 2021 | Published: 08 Oct 2021

ComputerWeekly.com

Spear Phishing vol4: Impersonations are increasingly more common, sophisticated and targeted.
sponsored by Barracuda
WHITE PAPER: Spear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

Barracuda

SecureDoc Enterprise Endpoint Encryption | Device Control
sponsored by WinMagic
DATA SHEET: As passwords become less reliable, organizations turn to defense strategies based around endpoint encryption to protect their users, manage devices, prevent breaches and ensure regulatory compliance. Read this data sheet to learn more about SecureDoc Enterprise – designed to offer each of these capabilities under one unified console.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

WinMagic

Evaluating Data-centric Protection Solutions
sponsored by Comforte AG
EBOOK: Data is the lifeblood of any organization, and as such, it’s critical that any data-centric protection system works 100% of the time. Moreover, these systems must be vetted so you know you’re getting an agile, yet mission-critical tokenization service. Absorb this guide for evaluating and comparing tokenization solutions.
Posted: 09 Dec 2020 | Published: 09 Dec 2020

Comforte AG

Protect Your Data on the Way to the Cloud
sponsored by Atakama
RESOURCE: Las year, the New York Department of Financial Services (NY DFS) issued 23 NYCRR 500, adding yet another compliance requirement to the already heavily regulated financial industry. Read this article to learn more about NY DFS, who it affects and why it matters.
Posted: 14 Dec 2020 | Published: 19 Oct 2020

Atakama

How to Eliminate Your Company's Cloud Security Exposure Risks
sponsored by Atakama
RESOURCE: When it comes to the cloud, there are specific risks that CISOs need to be aware of and prepare for prior to their migration. Read this article to learn more about the top threats to cloud computing and discover best practices for combating them.
Posted: 11 Dec 2020 | Published: 27 Jul 2020

Atakama

SIEM, SOAR or both? Our security experts weigh in
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences