Standards  >   Security Standards  >   Encryption Standards  >   Data Encryption Standard  >  

DSS (Digital Signature Standards)

RSS Feed   
DSS (Digital Signature Standards) Reports
 
Build your Content Security and Document Management Plan
sponsored by Adobe
EGUIDE: In this expert e-guide, we explore how you can create an effective content security and document management strategy. Discover 5 tips for a sound content security policy and learn about the differences between digital signature, e-signature, and digital certificates.
Posted: 27 Feb 2018 | Published: 22 Feb 2018

Adobe

Endpoint Protection Best Practices to Block Ransomware
sponsored by Sophos
WHITE PAPER: Ransomware attacks are on the rise – both in terms of frequency and average cost per attack. This white paper provides a comprehensive look into how ransomware attacks work, how they can be stopped, and best practices for configuring your endpoints for the strongest protection possible – read on to get started.
Posted: 11 Jan 2021 | Published: 31 Jul 2020

Sophos

Adapt to Long-Term Remote Work with Adaptive Access Policies
sponsored by Okta
VIDEO: Last year, organizations scrambled to enable their employees to work remotely – but how are organizations preparing for reality of a decentralized workforce for the long term? Watch this webinar to learn more about sustainable best practices for securing and enabling a remote workforce.
Posted: 14 Jan 2021 | Premiered: 14 Jan 2021

Okta

Spear Phishing: Top 3 Impersonation Attacks
sponsored by Barracuda
WHITE PAPER: Spear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

Barracuda

BlackBerry Cyber: Video
sponsored by BlackBerry
VIDEO: According to a recent Gartner survey, leaders are planning to allow remote work even in the post-pandemic world. Watch this webinar to learn how BlackBerry is working with organizations to establish a long-term plan to secure their remote workforce.
Posted: 30 Dec 2020 | Premiered: 30 Dec 2020

BlackBerry

Sigma Synthetic Fraud
sponsored by Socure
DATA SHEET: Synthetic identity fraud is continuing to emerge as the next generation of digital fraud and financial theft. The following data sheet provides a closer look at what this threat entails, why it’s been growing and how to best address it – read on to get started.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Socure

Agentless EDR For Unmanaged Devices
sponsored by Armis
PRODUCT OVERVIEW: As the number of organizations within an environment grows, security teams need a way to identify, manage and secure them. Read this solution brief for a closer look at Armis’ agentless endpoint detection and response (EDR) platform, which provides the visibility, compliance and security requirements needed to address this initiative.
Posted: 14 Dec 2020 | Published: 14 Dec 2020

Armis

5 Steps to Secure Home Devices & Improve Productivity for Remote Work
sponsored by Barracuda
WHITE PAPER: Due to the pandemic, remote work became an essential part of a modern enterprise. But for remote work and employees to thrive, they need fast and secure access to data. Read on to discover 5 steps organizations can take to further secure their remote workers, without sacrificing productivity.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

Barracuda

SASE & the Forces Shaping Digital Transformation
sponsored by Netskope
RESOURCE: With the rise of of digital transformation, SASE, and the continuing effects of the COVID-19 pandemic, there are key forces that security practitioners need to be aware of. This blog outlines and details how security leaders can adapt to these key forces in a digitally transforming, SASE-enabled world – read on to get started.
Posted: 12 Jan 2021 | Published: 05 Nov 2020

Netskope

Driving Real Behavior Change
sponsored by Proofpoint
EBOOK: Because today’s cyberattacks often target an organization’s users, a people-centric approach gives your security team the best chance at identifying and preventing potential threats. Read this e-book to discover how to build an effective security awareness training program.
Posted: 14 Dec 2020 | Published: 14 Dec 2020

Proofpoint
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info