Standards  >   Security Standards  >   Encryption Standards  >   Data Encryption Standard  >  

DSS (Digital Signature Standards)

RSS Feed   
DSS (Digital Signature Standards) Reports
 
Digital Signatures Made Easy
sponsored by GlobalSign
EBOOK: To ease the electronic transition, seamless document processing is becoming more useful than ever and the key to it all are digital signatures. Check out this e-book to run through 5 key phases of the digital signature implementation process to effectively digitize your content.
Posted: 16 Mar 2020 | Published: 16 Mar 2020

GlobalSign

Build your Content Security and Document Management Plan
sponsored by Adobe
EGUIDE: In this expert e-guide, we explore how you can create an effective content security and document management strategy. Discover 5 tips for a sound content security policy and learn about the differences between digital signature, e-signature, and digital certificates.
Posted: 27 Feb 2018 | Published: 22 Feb 2018

Adobe

How Cyberattack Simulations Differ From Penetration & Vulnerability Tests
sponsored by Cymulate
WHITE PAPER: Targeted cyberattack simulation, vulnerability scans, penetration testing – which of these is the most effective method of identifying weaknesses within your defenses and ensuring your security capabilities can handle the rigors of today’s cyberthreats? Read this white paper to find out.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Cymulate

Why Digital Transformation Depends on Integrated Risk Management
sponsored by ServiceNow
EBOOK: Embarking on a digital transformation without considering risk management is like doing a massive home remodel on top of a crumbling foundation – which is why IT and non-IT leaders are embracing integrated risk management (IRM) as part of their transformation. Read this e-book to learn more about IRM and it’s role in digital transformation.
Posted: 28 Jan 2021 | Published: 28 Jan 2021

ServiceNow

Database and Big Data Security
sponsored by Comforte AG
RESEARCH CONTENT: This report provides an overview of database and big data security market along with guidance and recommendations for finding the sensitive data protection and governance products that best meet your requirements. Read this 75-page report to enhance your understanding of the market and discover how to find a solution best-fit to your needs.
Posted: 29 Jan 2021 | Published: 29 Jan 2021

Comforte AG

Security Compliance and Data Privacy the Open Source Way
sponsored by Red Hat
VIDEO: As our world grows increasingly data-driven, ensuring the privacy and security of customer data becomes a top priority for organizations – especially as each new compliance mandate is enforced. Watch this Red Hat webinar to learn more about the evolving landscape of data security and privacy.
Posted: 26 Jan 2021 | Premiered: 26 Jan 2021

Red Hat

Meeting NIST SP 800-207 with CyberArk
sponsored by Merlin International
RESOURCE CENTER: Embracing a Zero Trust security model is the official recommendation of the US House of Representatives – but how can US federal agencies align their methods with Zero Trust best practices? Read this report to learn about the core tents of the NIST Zero Trust Architecture (ZTA) and how agencies should work towards implementation.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Merlin International

Okta + HYPR: Secure, Passwordless Authentication for Employees and Consumers
sponsored by Okta
DATA SHEET: Passwords present a significant weakness in an organization’s security architecture, and cybercriminals are keen on exploiting this weakness. Read this data sheet to learn how Okta and HYPR are enabling organizations to eliminate passwords in favor of passwordless authentication methods.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Okta

The Journey from EDR to MDR
sponsored by Bitdefender
VIDEO: Managed Detection and Response (MDR) represents the fastest growing sector of cybersecurity and it is very clear that security has now become even more important than ever before. This video provides an overview of Endpoint Detection And Response (EDR), MDR and how to know when it’s time to make the switch to MDR.
Posted: 05 Feb 2021 | Premiered: 27 Nov 2020

Bitdefender

How Zivver Helps Organisations with ISO 27001 Compliance
sponsored by Zivver
PRODUCT OVERVIEW: Complying with all 114 of the controls required for ISO 27001 can be a complicated process. This solution brief provides a comprehensive list of the 22 controls covered in Zivver’s platform, designed to help your organization meet ISO 27001 compliance requirements.
Posted: 28 Jan 2021 | Published: 28 Jan 2021

Zivver
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info