Standards  >   Security Standards  >   Encryption Standards  >   Data Encryption Standard  >  

Digital Signature Standards

RSS Feed   
ALSO CALLED: DSS (Digital Signature Standards)
DEFINITION: Digital Signature Standard (DSS) is the digital signature algorithm (DSA) developed by the U.S. National Security Agency (NSA) to generate a digital signature for the authentication of electronic documents. DSS was put forth by the National Institute of Standards and Technology (NIST) in 1994, and has become the United States government standard for authentication of electronic documents.  … 

Digital Signature Standards definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Digital Signature Standards Reports
126 - 150 of 648 Matches Previous Page  |  Next Page
CW Special report on Symantec
sponsored by ComputerWeekly.com
WHITE PAPER: This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.
Posted: 14 May 2013 | Published: 14 May 2013

ComputerWeekly.com

Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts - updated
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

ComputerWeekly.com

Cyber Security 2016 and beyond
sponsored by ComputerWeekly.com
EGUIDE: Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

ComputerWeekly.com

Cyber Security in the Era of Industrial IoT
sponsored by Bayshore Networks
EGUIDE: Discover how to define, identify, and contextualize security needs in a connected enterprise as IoT becomes a more pervasive and important facet of today's business.
Posted: 22 May 2017 | Published: 22 May 2017

Bayshore Networks

Cyber security in the Nordics
sponsored by ComputerWeekly.com
EGUIDE: With the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.
Posted: 31 Jul 2017 | Published: 31 Jul 2017

ComputerWeekly.com

Cyber Threats: A perfect storm about to hit Europe?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: As the internet of things becomes increasingly popular, some European countries lack the capabilities to defend against cyber security threats. Meanwhile, in the private sector, hackers are stepping up attacks on manufacturing and telecommunications companies, this report from Marsh & McLennan reveals.
Posted: 21 Apr 2017 | Published: 21 Apr 2017

ComputerWeekly.com

Cyber Vulnerability Index 2012
sponsored by ComputerWeekly.com
RESEARCH CONTENT: More than three-quarters of the Forbes 2000 companies leak potentially dangerous data that could be exploited by hackers, this research from KPMG reveals.  The report explains the risks and the actions companies need to take to protect themselves.
Posted: 31 Aug 2012 | Published: 05 Jul 2012

ComputerWeekly.com

Cybersecurity Myths Debunked
sponsored by HelpSystems
WEBCAST: What do security experts Michael Bruemmer, Kevin Beaver, Troy Hunt and 3 others have to say about common IT security myths? Learn the truth about 6 misconceptions now.
Posted: 04 Aug 2017 | Premiered: Aug 4, 2017

HelpSystems

Cybersecurity: Turning Threat Data Into Threat Intelligence
sponsored by Farsight Security
WHITE PAPER: Learn how real-time DNS observations improve the accuracy and response time to cyberattacks and how to use passive DNS to escalate the discovery and accelerate the investigative timeline.
Posted: 08 May 2017 | Published: 08 May 2017

Farsight Security

Data Breach: Security Investigation, Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.
Posted: 01 May 2017 | Published: 01 May 2017

Splunk

Data Protection Masterclass: New EU Data Protection Regulation
sponsored by ComputerWeekly.com
PRESENTATION: Law firm, Morrison & Foerster, examines the impact of new EU Data Protection legislation on buinsesses.
Posted: 28 Sep 2012 | Published: 28 Sep 2012

ComputerWeekly.com

De-risking IT Lifecycle Management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

Defend Against New Security Threats to Your Data Center
sponsored by Bayshore Networks
WHITE PAPER: Discover how to defend your enterprise against the security challenges surrounding operational technology (OT) equipment required to support and maintain the modern data center.
Posted: 24 May 2017 | Published: 24 May 2017

Bayshore Networks

Cybercrime Battle Basics
sponsored by ThreatMetrix
WHITE PAPER: This paper shows you how integrated approaches that look beyond the firewall and single technology defenses can defend your company from emerging fraud threats.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

ThreatMetrix

Cybersecurity as a Growth Advantage
sponsored by Cisco
WHITE PAPER: Learn why the belief that the primary purpose of cybersecurity is growth enablement is starting to take hold among senior finance and line-of-business executives.
Posted: 19 Jan 2017 | Published: 19 Jan 2017

Cisco

Data Leak Protection Planning
sponsored by (ISC)2 UK Ltd
EBOOK: It's becoming more critical and more challenging to prevent data from leaking outside the organization. Read this ebook for expert tips and advice on plugging the holes in your organization's date security system.
Posted: 23 Sep 2010 | Published: 23 Sep 2010

(ISC)2 UK Ltd

Data Loss Prevention Stops Data Leaks Where They Start
sponsored by Trend Micro, Inc.
WHITE PAPER: Trend Micro Data Loss Prevention is a family of advanced DLP solutions that provide maximum protection for an enterprise’s critical information at endpoints, the point of use. The new built-in encryption module provides protection against unauthorized access to sensitive data on removable devices, one of the greatest risk areas for data loss.
Posted: 16 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.

Data Privacy e-Book
sponsored by SearchSecurity.co.UK
TECHNICAL ARTICLE: SearchSecurity.Co.UK presents a comprehensive guide to data privacy in the UK. Our experts cover all the angles in order to help you protect the data your organisation collects, transmits and stores.
Posted: 12 Apr 2011 | Published: 12 Apr 2011

SearchSecurity.co.UK

Data Protection Solution-Taking Control of Your Data
sponsored by Lumension
WHITE PAPER: Whatever your industry, safeguarding your data is critical to running your business and protecting the privacy of employees and customers. Learn four critical steps to effectively implement removable device control.
Posted: 12 Aug 2009 | Published: 30 Oct 2008

Lumension

Data Protection: Shedding the Light on Tape Encryption
sponsored by Iron Mountain
WHITE PAPER: Tape is an important part of organizations’ business continuity programs. However, since tape is portable, all of its contents − if not encrypted − are subject to exposure. Organizations must implement practices to ensure the security of its tapes’ contents. Read this white paper to learn more.
Posted: 12 May 2011 | Published: 12 May 2011

Iron Mountain

Data Protection: Solutions for Privacy, Disclosure and Encryption
sponsored by Trend Micro, Inc.
WHITE PAPER: Trend Micro data protection solutions address privacy, breach disclosure, and encryption requirements with Email Encryption and Data Loss Prevention solutions. These solutions address common IT compliance challenges with accuracy, usability, and cost-effectiveness. Read this white paper for more details.
Posted: 15 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.

Data Security Laws in the US
sponsored by Quantum Corporation
ASSESSMENT TOOL: This list features a selection of Data Security laws in the US. As Quantum is a computer storage company, we cannot be held responsible for the accuracy of this list. Please check with your local government or legal advisors on the laws in your own location. Thank you.
Posted: 08 Oct 2009 | Published: 01 Jul 2009

Quantum Corporation

Delivering applications anywhere, anytime with maximum security and control over data
sponsored by Citrix
WHITE PAPER: Information security continues to be a significant challenge for enterprises. This whitepaper reviews the security challenges associated with traditional application deployment, management and application security and benefits of delivering applications on demand with Citrix XenApp
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Citrix

Delivering corporate data securely on employee iPads™
sponsored by Citrix
WHITE PAPER: This white paper provides detailed insight into the latest iPad adoption trends and examines the issues that often accompany these devices from an IT perspective. Find out how the iPad differs from a traditional PC with respect to security and obtain helpful recommendations to help you balance user preferences with security and control.
Posted: 10 Jan 2012 | Published: 10 Jan 2012

Citrix

Dell Data Protection
sponsored by DellEMC and Intel®
WEBCAST: This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
Posted: 13 Mar 2014 | Premiered: Mar 13, 2014

DellEMC and Intel®
126 - 150 of 648 Matches Previous Page    4 5 6 7 8 9    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement