Standards  >   Security Standards  >   Encryption Standards  >   Data Encryption Standard  >  

DSS (Digital Signature Standards)

RSS Feed   
DSS (Digital Signature Standards) Reports
 
Build your Content Security and Document Management Plan
sponsored by Adobe Inc
EGUIDE: In this expert e-guide, we explore how you can create an effective content security and document management strategy. Discover 5 tips for a sound content security policy and learn about the differences between digital signature, e-signature, and digital certificates.
Posted: 27 Feb 2018 | Published: 22 Feb 2018

Adobe Inc

Web Application Firewall Vendor Comparison Report
sponsored by Barracuda
ANALYST REPORT: The following vendor-agnostic Gartner report provides a comprehensive overview of the web application firewall (WAF) market and dissects the strengths and drawbacks of 12 WAF vendors. Download now to use this exclusive resource to decide for yourself which solution provides the best fit for your enterprise.
Posted: 14 Oct 2019 | Published: 17 Sep 2019

Barracuda

Why Should I Care About SSL/TLS Decryption?
sponsored by Gigamon
WEBCAST: On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. In this webcast, Druce McFarlane, Director of Product Management at Gigamon, discusses how TLS/SSL encryption has become a threat vector, and how to make sure your detection tools are working at their greatest capacity.
Posted: 24 Sep 2019 | Premiered: Sep 24, 2019

Gigamon

Revisiting Public Cloud Security
sponsored by Barracuda
WHITE PAPER: From a survey of 300 ITDMs, this report digs into the benefits and challenges of the public cloud and revisits several strategies to strengthen security. Read on to ensure your organization's public cloud security posture is in good standing.
Posted: 25 Apr 2019 | Published: 25 Apr 2019

Barracuda

Protecting Your Organization with Strong Security Controls
sponsored by OneNeck IT
WHITE PAPER: The Center for Internet Security (CIS) developed a standardized approach and set of best practices for businesses to use to identify their specific security requirements and develop a security strategy. This approach is known as the CIS Controls approach. Download this white paper to unlock the industry expertise outlined in the CIS Controls.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

OneNeck IT

Bovis Homes
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, follow the journey of Bovis Homes, a residential development company in the UK, as they partner with Absolute Software to establish visibility and control over their disparate mobile endpoints to ensure security and meet GDPR compliance.
Posted: 10 Feb 2020 | Published: 25 Jun 2019

Absolute Software Corporation

Trust But Verify: Mobile App Protection Best Practices
sponsored by Arxan
WEBCAST: This webcast explores how to evolve app security to face modern day threats and stop them before they can spread across your network. Discover a set of best practices for app security and threat mitigation, plus learn about Arxan's comprehensive app protection and alerting capabilities.
Posted: 15 Feb 2019 | Premiered: Feb 15, 2019

Arxan

Enhance your Cloud Security with AMD EPYC Hardware Memory Encryption
sponsored by AMD
DATA SHEET: Consumers and enterprises are becoming increasingly concerned about the security of their digital data, and with just cause. This sense of heightened concern is particularly relevant given the ongoing migration of end user data into the cloud. Read on to learn about the protection requirements for data in flight, data at rest, and data in use.
Posted: 04 Sep 2019 | Published: 04 Sep 2019

AMD

Analyst Insights: Trends Driving the Need for a SOC-as-a-Service
sponsored by Arctic Wolf
WEBCAST: This webcast examines the top cybersecurity challenges facing SMBs and explores how you can bolster your defenses against pernicious threats with a security operations center as a service (SOCaaS).
Posted: 11 Sep 2018 | Premiered: Sep 11, 2018

Arctic Wolf

Build Identity Verification Processes with the Power of AI
sponsored by Jumio
EGUIDE: This expert e-guide explores recent developments in AI-powered identity verification technology. Get tips on how to outsmart potential fraudsters by finding out how you can improve your identity verification practices by building machine learning and other AI-based technologies into your security strategy.
Posted: 19 Nov 2018 | Published: 15 Nov 2018

Jumio
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info