IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Base Encryption

RSS Feed   
Data Base Encryption Reports
 
Mobile Device Security Best Practices for BYOD
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide from SearchMobileComputing.com explores the issue of mobile device security and offers best practices for making a BYOD program work in your organization.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

SearchSecurity.com

Data Protection and PCI Scope Reduction for Today's Businesses
sponsored by Micro Focus
WHITE PAPER: Tokenization is a method of data protection and audit scope reduction recommended by the PCI DSS Security Standards Council. However, merchants and service providers who have implemented it have encountered problems. In this white paper, learn about the SecureData platform with Secure Stateless Tokenization.
Posted: 30 Jan 2019 | Published: 30 Jun 2018

Micro Focus

Privacy and Big Data
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from ISACA, a non-profit security association, lists 16 key questions companies need to answer when considering the privacy and governance aspects of big data.
Posted: 19 Aug 2013 | Published: 19 Aug 2013

ComputerWeekly.com

CW Europe – December 2018
sponsored by ComputerWeekly.com
EZINE: Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
Posted: 06 Dec 2018 | Published: 13 Dec 2018

ComputerWeekly.com

Jargon buster guide to GDPR
sponsored by ComputerWeekly.com
EGUIDE: In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.
Posted: 31 Mar 2017 | Published: 31 Mar 2017

ComputerWeekly.com

Cloud computing storage key management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
Posted: 04 May 2016 | Published: 04 May 2016

ComputerWeekly.com

Jericho Forum: Data Protection
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Data protection needs to provide stronger, more flexible protection mechanisms around the data itself, the Jericho Forum/Open Group argues in this report.
Posted: 18 Jan 2013 | Published: 18 Jan 2013

ComputerWeekly.com

Protecting Your Website With Always On SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.
Posted: 11 Sep 2013 | Published: 01 May 2012

Symantec Corporation

E-Guide: Align Data Protection with Business Importance
sponsored by IBM
EGUIDE: This SearchStorage.com E-Guide discusses the importance of protecting not just data but "use" of the associated information system, and outlines 4 capabilities needed for a better approach to data protection. Read on to learn more.
Posted: 25 Aug 2011 | Published: 25 Aug 2011

IBM

Security in the Cloud Planning Guide
sponsored by Intel
WHITE PAPER: Security is a top concern for businesses looking to implement a cloud computing environment throughout their systems.  This white paper provides a comprehensive guide on building security in the cloud from the ground up so you can ensure your data and platforms are protected.
Posted: 23 Feb 2012 | Published: 01 Sep 2011

Intel
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement