Standards  >   Security Standards  >   Encryption Standards  >  

Block Cipher

RSS Feed   
Block Cipher Reports
 
Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

Simplify Compliance for FFIEC-NCUA with a Security Operations Center
sponsored by Arctic Wolf
WHITE PAPER: Find out how financial organizations can simplify FFIEC/NCUA compliance by leveraging a security operations center as a service (SOCaaS).
Posted: 10 Aug 2018 | Published: 10 Aug 2018

Arctic Wolf

HID ActivOne User Friendly Strong Authentication
sponsored by HID Global
WHITE PAPER: As the number of ways to access your organization and its sensitive data increase, so does the potential for breaches. Securing credentials through strong authentication is key to preventing identity-related data breaches. In this white paper, learn how HID Global protects identities by taking a holistic approach to identity and access management.
Posted: 11 Apr 2019 | Published: 02 Nov 2018

HID Global

Sports-Centric Streaming Service fuboTV Sees 50% ROI - Just from Auth0's Security
sponsored by Auth0
CASE STUDY: Read this case study to find out how fuboTV partnered with Auth0 in order to improve and scale their authentication and authorization workflows.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Auth0

Cloud Security Gateways, Q1 2019
sponsored by McAfee, Inc.
RESEARCH CONTENT: Protecting cloud applications from data loss or theft, privacy abuses, and other risks is challenging. In the evolving market for cloud security gateways (CSGs), enterprises want to monitor and secure all their cloud workloads using few solutions. In this report, learn more about the top CSG vendors and what you should look for in a provider.
Posted: 24 Apr 2019 | Published: 20 Feb 2019

McAfee, Inc.

How to Simplify Security and Shrink the Attack Surface
sponsored by VMware and Intel
WHITE PAPER: Modern applications are dynamic and distributed – and the attack surface keeps growing as a result. To secure your business, you need security integrated into your infrastructure, not bolted-on. Download the eBook to learn how to reduce the attack surface and simplify security.
Posted: 23 May 2019 | Published: 31 Aug 2018

VMware and Intel

Altr's Blockchain-Based Tokenization Provides Transformative Reduction of PCI Scope
sponsored by ALTR
PRODUCT OVERVIEW: Merchants and issuers across the payments space are working to reduce the amount of PCI-sensitive data they store and the number of systems that touch that data, but this can be difficult across legacy systems. In this resource, learn how ALTR Protect can easily integrate into existing infrastructure to ensure that any type of data is protected.
Posted: 11 Jun 2019 | Published: 11 Jun 2019

ALTR

How to Reduce Security Risks through Better DNS Visibility & Analysis
sponsored by Corelight
WEBCAST: In this webcast, find out how you can drive visibility into DNS traffic so that you can create a strong security analytics strategy that enables you to reduce risks for your network.
Posted: 04 Feb 2019 | Premiered: Jan 9, 2019

Corelight

How to Protect Against the Top 5 Cyberattacks
sponsored by Arctic Wolf
WHITE PAPER: Find out why many existing security practices struggle to keep up with 5 of the leading cyberthreats, and learn about the important roles played by a security operations center and customized threat detection in maintaining compliance.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

Arctic Wolf

Build Identity Verification Processes with the Power of AI
sponsored by Jumio
EGUIDE: This expert e-guide explores recent developments in AI-powered identity verification technology. Get tips on how to outsmart potential fraudsters by finding out how you can improve your identity verification practices by building machine learning and other AI-based technologies into your security strategy.
Posted: 19 Nov 2018 | Published: 15 Nov 2018

Jumio
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement