Standards  >   Security Standards  >   Encryption Standards  >   Data Encryption Standard  >  

DSS (Digital Signature Standards)

RSS Feed   
DSS (Digital Signature Standards) Reports
 
Digital Signatures Made Easy
sponsored by GlobalSign
EBOOK: To ease the electronic transition, seamless document processing is becoming more useful than ever and the key to it all are digital signatures. Check out this e-book to run through 5 key phases of the digital signature implementation process to effectively digitize your content.
Posted: 16 Mar 2020 | Published: 16 Mar 2020

GlobalSign

Build your Content Security and Document Management Plan
sponsored by Adobe
EGUIDE: In this expert e-guide, we explore how you can create an effective content security and document management strategy. Discover 5 tips for a sound content security policy and learn about the differences between digital signature, e-signature, and digital certificates.
Posted: 27 Feb 2018 | Published: 22 Feb 2018

Adobe

Enabling Partners With Simple, Private Application Access
sponsored by Axis Security
WHITE PAPER: Securing and managing third-party access to critical applications is a growing concern for IT teams. This whitepaper offers a closer look at the Axis Security Application Access Cloud, designed to simplify, accelerate and secure third-party application enablement & management – read on to get started.
Posted: 08 Jan 2021 | Published: 08 Jan 2021

Axis Security

Zero trust: Taking back control of IT security
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide we go in-depth to explore the concept of zerotrust. First, Cliff Saran explores some of the basics of zerotrust, exploring how the advent of mobile computing, remote working, and software-as-a-service (SaaS) had already started the shift in security focus away from the perimeter – even before the Covid-19 pandemic.
Posted: 18 Jan 2021 | Published: 18 Jan 2021

ComputerWeekly.com

SURFnet Selects Thales Luna HSMs to Secure DNSSEC Material
sponsored by Thales
CASE STUDY: As part of an organization-wide initiative to ensure DNS security and compliance, SURFnet partnered with Thales to address several challenges they were facing related to DNS. Read this case study to see why they chose Thales as their DNS security and compliance partner and learn more about the outcomes of this initiative.
Posted: 29 Jan 2021 | Published: 29 Jan 2021

Thales

5 steps to secure home devices & improve productivity for remote work
sponsored by Barracuda
WHITE PAPER: Due to the pandemic, remote work became an essential part of a modern enterprise. But for remote work and employees to thrive, they need fast and secure access to data. Read on to discover 5 steps organizations can take to further secure their remote workers, without sacrificing productivity.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

Barracuda

SecureDoc File Encryption
sponsored by WinMagic
DATA SHEET: When it comes to protecting sensitive data, full drive encryption sets a strong data protection foundation. But file-level protection adds an additional layer of security, and as such, it’s often recommended as part of a defense-in-depth security strategy. Scan through this data sheet to read up on SecureDoc File Encryption.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

WinMagic

The Total Economic Impact™ Of ServiceNow Risk And Compliance
sponsored by ServiceNow
RESEARCH CONTENT: Download this Forrester Total Economic Impact Report for exclusive insight into the efficiencies and advancements in governance, risk and compliance (GRC), vendor risk management (VRM) and business continuity management (BCM) with ServiceNow Risk and Compliance – as well as an analysis of costs.
Posted: 10 Feb 2021 | Published: 31 Jan 2021

ServiceNow

Protect Your Data on the Way to the Cloud
sponsored by Atakama
RESOURCE: Las year, the New York Department of Financial Services (NY DFS) issued 23 NYCRR 500, adding yet another compliance requirement to the already heavily regulated financial industry. Read this article to learn more about NY DFS, who it affects and why it matters.
Posted: 14 Dec 2020 | Published: 19 Oct 2020

Atakama

How do you solve a problem like security training?
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
Posted: 17 May 2021 | Published: 17 May 2021

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences