Standards  >   Security Standards  >   Encryption Standards  >  

Symmetric Block Cipher

RSS Feed   
Symmetric Block Cipher Reports
 
Protecting IIoT Devices from Ransomware and Botnet Infections at Scale
sponsored by Barracuda Networks
PRODUCT OVERVIEW: To achieve multi-tiered secure access and cloud scalable security for IIoT devices, read this sheet. It provides you an overview of a secure access controller built for dispersed devices and environments.
Posted: 20 May 2019 | Published: 31 Dec 2018

Barracuda Networks

Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

MITRE ATT&CK: The Power of Prevention
sponsored by BlackBerry
VIDEO: In this brief webinar, join industry experts as they provide insight into optimizing the MITRE ATT&CK framework using artificial intelligence and machine learning – providing an overview of the framework and why it’s important, as well as the role of AI for enhance threat detection and prevention.
Posted: 21 Jul 2020 | Premiered: 21 Jul 2020

BlackBerry

Faster Threat Detection and Response with Data Science and Next-gen SIEM
sponsored by Cysiv
WHITE PAPER: Download this white paper for a closer look at Cysiv’s data science-driven approach to more quickly, effectively and efficiently investigate cyber threats within their next-gen security information and event management (SIEM) platform.
Posted: 17 Jul 2020 | Published: 22 Apr 2020

Cysiv

Cloud is the dream, don’t let risk and compliance be your nightmare
sponsored by Xtravirt
WHITE PAPER: Organizations worldwide are adopting cloud capabilities at an unprecedented rate in order to ensure flexibility and scalability in uncertain times. However, effective cloud environments require cloud-ready compliance and risk considerations. Download this white paper to evaluate and gauge your organization’s cloud security readiness.
Posted: 11 Aug 2020 | Published: 11 Aug 2020

Xtravirt

SailPoint Identity Now: Dashboard Overview
sponsored by SailPoint Technologies
VIDEO: In this brief, 2-minute informational video, enjoy an overview of SailPoint’s Identity Now dashboard, an identity and access management hub designed to enable quick and easy access controls of for employees. Watch now for a quick look at the key features and how it works.
Posted: 24 Jul 2020 | Premiered: 24 Jul 2020

SailPoint Technologies

Identity & Access Management from IBM
sponsored by IBM
RESOURCE: Although intricate, identity and access management (IAM) has become a key practice for effective risk management and information security programs. The following resource contains an interactive whitepaper, which uses a helpful metaphor to demonstrate the value of IAM.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

IBM

A Guide to Setting Up Your Insider Threat Management Program
sponsored by Proofpoint
EBOOK: In this past 2 years, the average cost of insider threats grew to a devastating $11.45 million per incident (the frequency also increased too). Download this e-book to learn more about the varying types of insider threats, how to set up an insider threat management program, best practices, and more.
Posted: 27 Jul 2020 | Published: 27 Jul 2020

Proofpoint

SailPoint Predictive Identity™: AI-driven Identity for Today’s Modern Enterprise
sponsored by SailPoint Technologies
TECHNICAL ARTICLE: The benefits of a digital transformation can create access complications, which can often lead to potential security risks. In this technology brief, discover how SailPoint harnesses the power of AI and machine learning in their Predictive Identity platform to help organizations ensure security, compliance and access management.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

SailPoint Technologies

Cloud Insiders - Risk and Compliance in the Hybrid Cloud
sponsored by Xtravirt
WEBCAST: A hybrid cloud carries a heavy risk profile that extends throughout its infrastructure. Staying updated, implementing new features & monitoring security threats are critical processes. Not to mention the constant changes in regulations to look out for. Watch this webcast to learn more about risk & compliance in hybrid clouds.
Posted: 10 Aug 2020 | Premiered: Aug 10, 2020

Xtravirt
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info