Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >   Public Key Encryption Software  >  

Pretty Good Privacy

RSS Feed   
ALSO CALLED: PGP
DEFINITION: Pretty Good Privacy (PGP) is a popular program used to encrypt and decrypt e-mail over the Internet. It can also be used to send an encrypted digital signature that lets the receiver verify the sender's identity and know that the message was not changed en route. Available both as freeware and in a low-cost commercial version, PGP is the most widely used privacy-ensuring program by individuals and  … 

Pretty Good Privacy definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Pretty Good Privacy Reports
1 - 25 of 1469 Matches Previous Page  |  Next Page
10 Best Practices for Internet Security
sponsored by Verizon
RESOURCE: Beyond firewalls, antivirus software and other security capabilities, organizations need to understand and address other vulnerability areas that’s don’t require spending to solve. This article from Verizon highlights 10 best internet security practices to help your organization maintain good security hygiene, read on to get started.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Verizon

10 Cybersecurity Best Practices for Securing Remote Workers
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: As a result of the pandemic, organizations are being forced to re-allocate their resources in order to focus on securing their predominantly remote workers. In order to help organizations adjust to the new normal, Arctic Wolf created this checklist of 10 WFH best practices – read on to get started.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Arctic Wolf Networks, Inc.

10 Endpoint Security Problems and How the Cloud Solves Them
sponsored by VMware International Unlimited Company
WHITE PAPER: In today’s world of increasingly frequent and complex threats, the responsibility of protecting endpoints can no longer be left to traditional security tactics. In this whitepaper, discover why & how organizations are embracing cloud-based endpoint security platforms.
Posted: 18 May 2020 | Published: 18 May 2020

VMware International Unlimited Company

10 Experts on Active Threat Management
sponsored by GoSecure
EBOOK: The number of pervasive cyberthreats is growing larger with each passing week, which can leave security professionals feeling overwhelmed. In this e-book, hear from 10 IT security experts, including directors and C-level executives, on active threat management and data protection, and learn how you can better predict, prevent and detect attacks.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

GoSecure

10 Tips to Strengthen your Insider Threat Program
sponsored by Dtex
EBOOK: With the commonality of remote work creating more vulnerability than ever, strengthening threat detection has become paramount. But how do you go about putting your eggs in the right security baskets? Read this explosive e-book for 10 tips for strengthening your insider threat program.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Dtex

10 Ways to Secure and Accelerate a Modern Workforce
sponsored by Cloudflare
EBOOK: As organizations become increasingly dependent on remote users (employees, partners and contractors), protecting remote users and managing access becomes a critical part of an organization’s success. Read this e-book to uncover 10 best practices for ensuring remote access security without compromising productivity.
Posted: 30 Apr 2020 | Published: 30 Apr 2020

Cloudflare

100 Days of Coronavirus (COVID-19)
sponsored by Mimecast
WHITE PAPER: To better understand how the coronavirus pandemic has been (and will be) exploited by malicious users, Mimecast created this analyst report, 100 Days of Coronavirus (COVID-19), which analyzes activity across the first 100 days. Download the report to unlock the key trends and recommendations.
Posted: 15 Jul 2020 | Published: 31 May 2020

Mimecast

11-Minute Webinar: Strategies to Work from Anywhere
sponsored by Okta
WEBCAST: Telework involves more than getting your employees up and running with video conferencing – it requires a massive shift in how people work and how you think about securing users and their devices. Don’t float adrift in a sea of distributed workforce challenges – watch this 10-minute webinar and learn how to manage access and security.
Posted: 30 Sep 2020 | Premiered: Jul 24, 2020

Okta

12 Reasons Why You Need Stronger Mobile App Security
sponsored by NowSecure
RESOURCE: Whether it’s for internal communication, enhancing customer experience or part of a digital transformation initiative, mobile applications play a critical role and ensuring their protection is paramount. Download this infographic to discover 12 reasons why organizations need stronger mobile app security strategies.
Posted: 22 Jun 2020 | Published: 22 Jun 2020

NowSecure

13 Email Threat Types to Know about Right Now
sponsored by Barracuda
RESOURCE: As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
Posted: 07 May 2020 | Published: 01 May 2020

Barracuda

2017 IT Priorities in the Middle East
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Benchmark your IT spending plans with our in-depth study of IT spending priorities in the Middle East.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

ComputerWeekly.com

2019 CrowdStrike Global Security Attitude Survey
sponsored by CrowdStrike
WHITE PAPER: Each year, CrowdStrike conducts a Global Security Attitude Survey to better understand the current state of incident detection and response. The industry ideal is set at the 1-10-60 rule: 1 minute to detect, 10 minutes to understand, and 60 minutes to contain. Read the research results and see how close organizations came to this benchmark.
Posted: 14 May 2020 | Published: 14 May 2020

CrowdStrike

2020 Application Security Observability Report
sponsored by Contrast Security
WHITE PAPER: Nearly 96% of applications contain at least one vulnerability, yet only 26% have a serious vulnerability – modern vulnerability management, especially when it comes to applications – is about effectively prioritization. For more findings and guidance for building an application security strategy, read this research report.
Posted: 21 Sep 2020 | Published: 13 Jul 2020

Contrast Security

2020 Cybersecurity Outlook Report
sponsored by VMware International Unlimited Company
WHITE PAPER: The fight between organizations trying to secure their data and cyberattackers looking for ways to steal it is a constant struggle that seems to constantly evolve. As organizations employ stronger defenses, hackers find more creative ways to bypass them. In this research report, uncover the findings from a study into the evolution of this pattern.
Posted: 01 May 2020 | Published: 01 May 2020

VMware International Unlimited Company

2020 Data Breach Executive Brief
sponsored by Verizon
WHITE PAPER: Each year, Verizon conducts a Data Breach Investigations Report (DBIR) to observe and analyze data breaches and provide industry professionals with key takeaways, industry highlights, relevant best practices, and more. Download this executive brief to unlock this year’s findings.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Verizon

2020 Data Breach Investigations Report
sponsored by Verizon
WHITE PAPER: Each year, Verizon conducts a Data Breach Investigations Report (DBIR) to observe and analyze data breaches and provide industry professionals with key takeaways, industry highlights, relevant best practices, and more. Read on to unlock the complete 119-page report overviewing this year’s findings.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

Verizon

2020 Election Security
sponsored by WhiteHat Security
WHITE PAPER: Around the globe, we’ve witnessed how cybercriminals can create chaos during election cycles by disqualifying legitimate voters, corrupting voter data and launching denial-of-service attacks. In recent years, U.S. elections have come under continuous assault. See this white paper to learn about the security challenges this causes for the country.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

WhiteHat Security

2020 Global Threat Report
sponsored by Crowdstrike
WHITE PAPER: Each year, the CrowdStrike Intelligence team releases a report of their findings from looking into cyberattack trends and emerging adversaries over the previous year. This year’s report examines key trends in ransomware and eCrime as well as an overview of state-sponsored adversaries and their suspected motives.
Posted: 08 Apr 2020 | Published: 08 Apr 2020


2020 Payment Security Report
sponsored by Verizon
RESEARCH CONTENT: Each year, Verizon releases a Payment Security Report, which aggregates findings across a number of security and compliance subject areas into valuable insights designed to help CISOs understand and overcome key security pitfalls, operational challenges and compliance roadblocks – read on for this year’s report.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Verizon

2020 Remote Workforce Cybersecurity Guide
sponsored by Automox
WHITE PAPER: The sudden and dramatic fashion in which organizations had to enable nearly their entire workforce to operate remotely has brought about a new set of security challenges that need to be addressed. Download this white paper to explore these new threats and discover how to address them without increasing cost or complexity.
Posted: 09 Jun 2020 | Published: 09 Jun 2020


2020 SANS Cyber Threat Intelligence (CTI) Survey
sponsored by ThreatQuotient
WHITE PAPER: In order to understand the risks that threaten their sensitive data, organizations are embracing cyber threat intelligence (CTI) programs. But how effective are current CTI programs? This research report provides a comprehensive look at the results of the 2020 SANS Cyber Threat Intelligence (CTI) Survey – read on to get started.
Posted: 17 Sep 2020 | Published: 29 Feb 2020

ThreatQuotient

2020 State of Enterprise Cloud Adoption and Security
sponsored by DivvyCloud
WHITE PAPER: Cloud usage has been growing steadily over recent years, and that trend is expected to continue. However, misconfigurations and data breaches have led to security concerns. This report highlights the findings from a 2019 study into enterprise cloud adoption as well as security and compliance challenges. Read on to uncover the results.
Posted: 22 Apr 2020 | Published: 22 Apr 2020

DivvyCloud

10 Steps to Email Security
sponsored by Clearswift
WHITE PAPER: This white paper outlines the 10 simple steps to best practice in email security including the application of policy, technology and processes designed to keep email safe and secure.
Posted: 10 Sep 2010 | Published: 12 Aug 2013

Clearswift

10 Ways You Can Improve Web App Performance
sponsored by SOASTA, Inc
WHITE PAPER: This resource counts down 10 issues that development and testing teams should consider in order to derive maximum performance from their Web applications.
Posted: 06 Jan 2014 | Published: 31 Dec 2013

SOASTA, Inc

2013 North American Software Defined Data Center Management Platforms New Product Innovation Award
sponsored by HPE and Intel®
RESEARCH CONTENT: Take a look at this in-depth resource to find out why HP received a "New Product Innovation Award" for their software defined data center management platforms.
Posted: 06 Feb 2014 | Published: 31 Dec 2013

HPE and Intel®
1 - 25 of 1469 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info