Jargon buster guide to GDPR
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.
Posted: 08 Feb 2021 | Published: 31 Mar 2017
|
|
|
Managing Android devices in the enterprise
sponsored by TechTarget ComputerWeekly.com
EBOOK:
This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).
Posted: 08 Feb 2021 | Published: 04 Aug 2016
|
|
|
CW Europe – December 2018
sponsored by TechTarget ComputerWeekly.com
EZINE:
Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
Posted: 08 Feb 2021 | Published: 13 Dec 2018
|
|
|
Royal Holloway: An enhanced approach for USB security management
sponsored by TechTarget ComputerWeekly.com
RESOURCE:
USB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.
Posted: 08 Feb 2021 | Published: 03 Jul 2020
|
|
|
The Investigatory Powers Act 2016 and Internet Connections Records
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
Posted: 08 Feb 2021 | Published: 09 May 2017
|
|
|
7 Requirements of Data Loss Prevention
sponsored by Symantec Corporation
WHITE PAPER:
This report provides a clear understanding of the capabilities a successful data loss prevention solution must deliver. It also incorporates insight into the capabilities that companies require from their solution.
Posted: 10 Mar 2009 | Published: 10 Mar 2009
|
|
|
MegaCryption v6.2
sponsored by Advanced Software Products Group, Inc. (ASPG, Inc.)
TRIAL SOFTWARE:
ASPG's latest enterprise encryption is designed for the prevention of data security breaches and securing data exchanged between business partners for z/OS, Windows, UNIX & Linux.
Posted: 06 Mar 2009 | Premiered: 06 Mar 2009
|
|
|
Efficient SAN Based Tape Encryption with Curtis Preston
sponsored by Cisco Systems, Inc.
WEBCAST:
Watch this webcast for expert tips on securing your SAN environment and meeting government regulations. Learn about a technique that transparently encrypts data inside the storage environment without slowing or disrupting business critical applications.
Posted: 14 Nov 2008 | Premiered: Dec 3, 2008, 11:00 EST (16:00 GMT)
|
|
|
Lessons Learned: Top Reasons for PCI Audit Failure and How to Avoid Them
sponsored by VeriSign, Inc
WHITE PAPER:
The drive to protect credit card data is vital, but many companies have yet to implement technologies and processes needed to address Payment Card Industry (PCI) compliance. This white paper examines top reasons for PCI failure and how to avoid them.
Posted: 21 Nov 2006 | Published: 01 Jul 2006
|
|
|
Stopping data leakage: Exploiting your existing security investment
sponsored by Sophos
WHITE PAPER:
This paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.
Posted: 01 Oct 2008 | Published: 01 Jun 2008
|
|