Encryption Standards Reports

7 NAS encryption best practices to protect data
sponsored by ComputerWeekly.com
EBOOK: NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.
Posted: 24 Mar 2022 | Published: 24 Mar 2022

ComputerWeekly.com

Computer Weekly - 1 February 2022: How Ocado pushes technological boundaries
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to Ocado's CTO about how the e-commerce company pushes technological boundaries. Our latest buyer's guide looks at the importance and technical challenges of data integration. There's a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now.
Posted: 28 Jan 2022 | Published: 01 Feb 2022

ComputerWeekly.com

Evaluating Data-centric Protection Solutions
sponsored by Comforte AG
EBOOK: Data is the lifeblood of any organization, and as such, it’s critical that any data-centric protection system works 100% of the time. Moreover, these systems must be vetted so you know you’re getting an agile, yet mission-critical tokenization service. Absorb this guide for evaluating and comparing tokenization solutions.
Posted: 08 Feb 2021 | Published: 09 Dec 2020

Comforte AG

The exploitation of flaws in the HTTPS protocol
sponsored by ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 16 Apr 2019 | Published: 16 Apr 2019

ComputerWeekly.com

Data protection rises up business agenda
sponsored by ComputerWeekly.com
EGUIDE: This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.
Posted: 17 Dec 2018 | Published: 17 Dec 2018

ComputerWeekly.com

Fintech & the digital customer experience
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, find out how banks such as Malaysia's RHB are keeping up in the digital age, the state of mobile payments across the APAC region, and why some bankers believe retail banking will be fully automated in just a few years.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

ComputerWeekly.com

A Security Assessment of Android Full-disk Encryption
sponsored by ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 01 Aug 2016 | Published: 02 Aug 2016

ComputerWeekly.com

What to Include in an SD-WAN Security Checklist
sponsored by Citrix
EGUIDE: SD-WAN can improve security in many ways. Simply migrating to a viable SD-WAN offering can bring benefits. But SD-WAN also provides security features to protect the traffic it manages, as well as features that protect the offering itself. Read this expert e-guide to uncover 4 different areas where enterprises should consider SD-WAN and security.
Posted: 10 Aug 2020 | Published: 30 Apr 2020

Citrix

Finding a Secure Managed File Transfer Tool: Key considerations
sponsored by SearchSecurity.com
EBOOK: Read this expert guide to explore key considerations that should be reviewed prior to an MFT investment and learn about the advantages of using a solution with enterprise file synchronization and sharing abilities.
Posted: 01 Jun 2020 | Published: 01 Jun 2020

SearchSecurity.com

The State of Cybersecurity and How It Will Evolve
sponsored by ALTR
EGUIDE: Download this e-guide for an exclusive Q&A with Raluca Ada Popa. Popa is equipped with four degrees from Massachusetts Institute of Technology, two research fellowships and a bevy of awards and merits. In this Q&A Popa discusses the future of data security and the challenges of ensuring adequate defense.
Posted: 19 Feb 2019 | Published: 15 Feb 2019

ALTR

Cyber-Risk Strategies and Models for a Post-Perimeter Age
sponsored by SearchSecurity.com
EBOOK: In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

SearchSecurity.com

Encryption Hiding Malware in Half of Cyber Attacks
sponsored by A10 Networks
EGUIDE: A Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

A10 Networks

EU GDPR Compliance Puts Focus on Data Tracking, Encryption
sponsored by Ivanti
EGUIDE: In this e-guide, experts explain why data tracking, encryption and other measures are crucial for GDPR compliance.
Posted: 05 Sep 2017 | Published: 31 Aug 2017

Ivanti

Enhance Your Endpoint Security Protection
sponsored by Trend Micro, Inc.
EGUIDE: Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.
Posted: 10 Nov 2016 | Published: 09 Nov 2016

Trend Micro, Inc.

Make Ransomware Attacks Less Dangerous
sponsored by Check Point Software Technologies Ltd.
EGUIDE: It's only a matter of time before a hacker infiltrates your system and holds your files hostage. What then? You can't defeat ransomware, but there are strategies you can adopt to make attacks less dangerous for your organization. Find out what your security options are in this e-guide.
Posted: 14 Jun 2016 | Published: 08 Jun 2016

Check Point Software Technologies Ltd.

Moving Beyond Ad Hoc Mobile Security
sponsored by SearchSecurity.com
EZINE: Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

SearchSecurity.com

Is Your Network Too Flat? Prevent Data Breaches with Segmentation
sponsored by SearchSecurity.com
EZINE: How do you determine if your network is too flat? Without proper network segmentation, attackers can easily move around the network, turning a minor problem into a major disaster. Learn about segmentation strategies that can improve your network security infrastructure in this issue of Information Security.
Posted: 02 May 2016 | Published: 02 May 2016

SearchSecurity.com

Prevent unauthorized database access with TDE
sponsored by Oracle Corporation
EGUIDE: This e-guide teaches you about Transparent Data Encryption (TDE) and how it prevents unauthorized personnel from accessing your database. You will learn how TDE encrypts data as it's written to storage and decrypts it when accessed by authorized users.
Posted: 23 Feb 2016 | Published: 16 Feb 2016

Oracle Corporation

Can A Subscription Ease SSL Certificate Management?
sponsored by Symantec Website Security
EGUIDE: This e-guide shows the benefits and disadvantages of HTTPS vs. SSL web encryption.
Posted: 16 Feb 2016 | Published: 10 Feb 2016

Symantec Website Security

Your data on the move: secure mobile devices in your network
sponsored by Vera
EGUIDE: In this e-guide, you will discover the proper methods to secure emerging enterprise hardware such as iPads, netbooks and more.
Posted: 15 Feb 2016 | Published: 12 Feb 2016

Vera

Encryption's Risks, Benefits, and Roles in SSL Attacks
sponsored by Symantec Website Security
EGUIDE: In this e-guide, expert Nick Lewis details ways to defend against SSL attacks. First, you'll uncover how to detect SSL attacks by inspecting network connections for anomalies. Next, you'll learn the importance of decoding SSL connections to further enable their detection and, ultimately, their mitigation.
Posted: 10 Feb 2016 | Published: 04 Feb 2016

Symantec Website Security

How One Airborne Wi-Fi Provider Issued Fake Google SSL Certificates, and Faced the Consequences
sponsored by Symantec Website Security
EGUIDE: This e-guide features a case study on how Gogo LLC issued fake Google SSL certificates. Learn how this incident caused ripples in the security industry, and uncover ways some vendors are increasingly observing encrypted traffic.
Posted: 09 Feb 2016 | Published: 04 Feb 2016

Symantec Website Security

Sorting Storage Options on AWS
sponsored by SearchAWS
EBOOK: Sorting through AWS Data Storage options is no small task. With a little background, however, you can successfully -- and securely -- choose the right option for your company.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

SearchAWS

How to Properly Move into the Cloud
sponsored by Forum Systems
EGUIDE: This e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Forum Systems

Symantec Data Loss Prevention for Mobile
sponsored by Symantec Corporation
WEBCAST: This webcast introduces the highest-rated DLP solution with industry-leading detection technology.
Posted: 27 Jun 2014 | Premiered: Jun 27, 2014

Symantec Corporation