SSL Certificate Management: Common Mistakes and How to Avoid Them
sponsored by TechTarget Security
EGUIDE:
Errors are bound to occur when SSL certificate management is handled manually. Learn how to avoid these common mistakes by reading this expert e-guide by penetration tester at First Base Technologies, Rob Shapland.
Posted: 18 Oct 2013 | Published: 18 Oct 2013
|
|
|
Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
sponsored by TechTarget Security
EGUIDE:
Expert Nick Lewis, CISSP, information security architect as Saint Louis University, covers in this e-guide how to implement and configure SSL's to ward off vulnerabilities within your organization.
Posted: 17 Oct 2013 | Published: 17 Oct 2013
|
|
|
Prevent unauthorized database access with TDE
sponsored by Oracle Corporation
EGUIDE:
This e-guide teaches you about Transparent Data Encryption (TDE) and how it prevents unauthorized personnel from accessing your database. You will learn how TDE encrypts data as it's written to storage and decrypts it when accessed by authorized users.
Posted: 23 Feb 2016 | Published: 16 Feb 2016
|
|
|
Can A Subscription Ease SSL Certificate Management?
sponsored by Symantec Website Security
EGUIDE:
This e-guide shows the benefits and disadvantages of HTTPS vs. SSL web encryption.
Posted: 16 Feb 2016 | Published: 10 Feb 2016
|
|
|
Your data on the move: secure mobile devices in your network
sponsored by Vera
EGUIDE:
In this e-guide, you will discover the proper methods to secure emerging enterprise hardware such as iPads, netbooks and more.
Posted: 15 Feb 2016 | Published: 12 Feb 2016
|
|
|
Encryption's Risks, Benefits, and Roles in SSL Attacks
sponsored by Symantec Website Security
EGUIDE:
In this e-guide, expert Nick Lewis details ways to defend against SSL attacks. First, you'll uncover how to detect SSL attacks by inspecting network connections for anomalies. Next, you'll learn the importance of decoding SSL connections to further enable their detection and, ultimately, their mitigation.
Posted: 10 Feb 2016 | Published: 04 Feb 2016
|
|
|
How One Airborne Wi-Fi Provider Issued Fake Google SSL Certificates, and Faced the Consequences
sponsored by Symantec Website Security
EGUIDE:
This e-guide features a case study on how Gogo LLC issued fake Google SSL certificates. Learn how this incident caused ripples in the security industry, and uncover ways some vendors are increasingly observing encrypted traffic.
Posted: 09 Feb 2016 | Published: 04 Feb 2016
|
|
|
Sorting Storage Options on AWS
sponsored by TechTarget Search AWS
EBOOK:
Sorting through AWS Data Storage options is no small task. With a little background, however, you can successfully -- and securely -- choose the right option for your company.
Posted: 20 Oct 2014 | Published: 20 Oct 2014
|
|
|
How to Properly Move into the Cloud
sponsored by Forum Systems
EGUIDE:
This e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.
Posted: 26 Aug 2014 | Published: 26 Aug 2014
|
|
|
Symantec Data Loss Prevention for Mobile
sponsored by Symantec Corporation
WEBCAST:
This webcast introduces the highest-rated DLP solution with industry-leading detection technology.
Posted: 27 Jun 2014 | Premiered: Jun 27, 2014
|
|
|
Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER:
This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014
|
|
|
Compare Windows 8 and Windows® XP Security Problems
sponsored by Lenovo and Microsoft
WHITE PAPER:
This white paper explains the most critical security-related differences between Windows® XP and Windows 8, including each operating system’s ability to provision security patches, integrate with MDM and more.
Posted: 11 Jun 2014 | Published: 11 Jun 2014
|
|
|
Computer Weekly – 10 June 2014: The case for a European cloud market
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, the European Commission wants to create a digital single market in Europe based on industry standard clouds – but is the plan realistic? Network encryption promises to solve many IT security threats – we examine the benefits. And our latest buyer's guide looks at business process management. Read the issue now.
Posted: 09 Jun 2014 | Published: 09 Jun 2014
|
|
|
Cloud Security Designed for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER:
This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
Posted: 19 May 2014 | Published: 19 May 2014
|
|
|
Top 10 Ways to Assess The Risk of Data Loss
sponsored by Infrascale
WHITE PAPER:
This white paper offers 10 signs of whether or not your employees are using free file sharing services and what kinds of risks these pose to your organization's sensitive data.
Posted: 15 May 2014 | Published: 15 May 2014
|
|
|
Adapting to the new web security and email security threats
sponsored by Cisco Systems, Inc.
EGUIDE:
In this expert e-guide from SearchSecurity.com, industry leaders Karen Scarfone and Nick Lewis offer critical tips to securing email and Web use – given the latest advanced, targeted threats.
Posted: 06 May 2014 | Published: 06 May 2014
|
|
|
EMC Isilon Scale-Out NAS and RainStor with Hadoop for Efficient Big Data Management
sponsored by RainStor Inc.
WHITE PAPER:
Many enterprises rely on Hadoop to manage and analyze large volumes of data, and as such, they are looking to deploy the right architecture to optimize compute and storage requirements. The traditional approach is running Hadoop on DAS -- but is there a better way?
Posted: 05 May 2014 | Published: 05 May 2014
|
|
|
Dell Data Protection
sponsored by DellEMC and Intel®
WEBCAST:
This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
Posted: 13 Mar 2014 | Premiered: Mar 13, 2014
|
|
|
NoSQL Does Not Have to Mean No Security
sponsored by IBM
WHITE PAPER:
This white paper explores the data security and compliance challenges with NoSQL ("not only SQL") databases, and offers key recommendations on how to address these problems.
Posted: 28 Feb 2014 | Published: 31 Jul 2013
|
|
|
EMC Integration of PKI and Authentication Services for Securing VMWare Vcloud Suite 5.1 Environments
sponsored by EMC & Arrow
WHITE PAPER:
This Proven Solutions Guide provides procedures for integrating hardened components including VMware vSphere, and unifying the environment's authentication mechanisms with a centralized directory. This guide details a secure multitenant Compute-as-a-Service cloud solution.
Posted: 21 Feb 2014 | Published: 31 Jul 2013
|
|
|
HIPAA Violations Incur Multi-Million Dollar Penalties
sponsored by Absolute
WHITE PAPER:
In this resource, read about some recent HIPAA breaches that cost the violating parties significant penalties and learn about the measures that can be put in place to help maintain compliance.
Posted: 21 Jan 2014 | Published: 15 Jan 2013
|
|
|
High Performance, High Capacity 2048/4096-bit SSL Offload February 2013
sponsored by A10 Networks
WHITE PAPER:
IT professionals are going to great lengths to foster business growth via data encryption. This guide outlines the importance of data protection and encryption, while exploring specific operating systems that provides scalability alongside enhanced performance levels.
Posted: 23 Dec 2013 | Published: 28 Feb 2013
|
|
|
Who’s Snooping on Your Email?
sponsored by Sophos
WHITE PAPER:
This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013
|
|
|
In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER:
This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013
|
|
|
The Pros and Cons of SSL Decryption for Enterprise Network Monitoring
sponsored by Symantec Corporation
EGUIDE:
SearchSecurity.com expert on network security, Brad Casey discusses the pros and cons of SSL decryption to determine its viability as an enterprise network monitoring aid. Read the e-guide and hear his opinion on how to use SSL decryption as an enterprise security tactic.
Posted: 17 Oct 2013 | Published: 17 Oct 2013
|
|