Standards  >   Security Standards  >   Encryption Standards  >  

FIPS PUB 197

RSS Feed   
FIPS PUB 197 Reports
 
Protecting IIoT Devices from Ransomware and Botnet Infections at Scale
sponsored by Barracuda Networks
PRODUCT OVERVIEW: To achieve multi-tiered secure access and cloud scalable security for IIoT devices, read this sheet. It provides you an overview of a secure access controller built for dispersed devices and environments.
Posted: 20 May 2019 | Published: 31 Dec 2018

Barracuda Networks

Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

A Guide to Setting Up Your Insider Threat Management Program
sponsored by Proofpoint
EBOOK: In this past 2 years, the average cost of insider threats grew to a devastating $11.45 million per incident (the frequency also increased too). Download this e-book to learn more about the varying types of insider threats, how to set up an insider threat management program, best practices, and more.
Posted: 27 Jul 2020 | Published: 27 Jul 2020

Proofpoint

How to prepare for and survive a ransomware attack
sponsored by Bytes Technology Group
WHITE PAPER: In this white paper, unlock expertise regarding preparing for and surviving ransomware attacks by looking at detailed processes and procedures for detecting, isolating, and recovering data infected by ransomware – including proven methods for securing and protecting data.
Posted: 16 Jul 2020 | Published: 30 Apr 2020

Bytes Technology Group

Phishing Factories and Economies: The Real Persistent Threat
sponsored by Akamai Technologies
VIDEO: A study conducted by Akamai indicates a recent uptick in Coronavirus-related phishing attacks. Pandemic aside – phishing threats continue to grow despite increasing investment into prevention methods. Watch this webinar to learn more about the evolving phishing landscape, emerging techniques, and more.
Posted: 03 Aug 2020 | Premiered: 03 Aug 2020

Akamai Technologies

The Business Case for Cysiv SOC-as-a-Service
sponsored by Cysiv
WHITE PAPER: Like most modern technology purchases, organizations interested in investing in a security operations center (SOC) can decide between an on-premise SOC or SOC-as-a-Service, depending on their organization’s specific needs. Download this white paper to discover the benefits of the SOC-as-a-Service model by looking at Cysiv’s SOC-aaS offering.
Posted: 20 Jul 2020 | Published: 20 Jul 2020

Cysiv

Incorporate Information Protection into Microsoft Teams from the Start
sponsored by Nucleus Cyber
RESOURCE: Microsoft Teams’ user base has nearly doubled over the past few months. However, new users face the risk of misconfiguration during initial setup, which can lead to data exposure and even theft. This article highlights 3 key practices new Microsoft Teams users should implement in order to avoid these risks.
Posted: 06 Aug 2020 | Published: 28 May 2020

Nucleus Cyber

SailPoint Identity Now: Dashboard Overview
sponsored by SailPoint Technologies
VIDEO: In this brief, 2-minute informational video, enjoy an overview of SailPoint’s Identity Now dashboard, an identity and access management hub designed to enable quick and easy access controls of for employees. Watch now for a quick look at the key features and how it works.
Posted: 24 Jul 2020 | Premiered: 24 Jul 2020

SailPoint Technologies

Threat Intelligence Driven Detect and Response Operations
sponsored by Bitdefender
WEBCAST: Cyber threat intelligence (CTI) is both a product and a process designed to equip users with actionable information regarding a threat, enabling to mitigate the impact. In this SANS webcast, join distinguished security experts as they further discuss incorporating CTI into your organizations threat detection, hunting and response program.
Posted: 23 Jul 2020 | Premiered: Nov 30, 2019

Bitdefender

Best Practices for Successful Transformation Journey with Automation
sponsored by Red Hat
VIDEO: In this round table discussion, join leaders at Andorra Telecom, Rabobank and Discovery as they share best practices and success stories regarding their digital transformation and journey towards automation.
Posted: 24 Jul 2020 | Premiered: 05 Jun 2020

Red Hat
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info