Standards  >   Security Standards  >  

Wireless Encryption Protocol

RSS Feed   
Wireless Encryption Protocol Reports
 
Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks

A Guide To Mitigating Risk of Insider Threats
sponsored by Microsoft
RESOURCE: Insider threats have been a growing issue – both in terms of volume and cost – made even more disruptive thanks to the 2020 pandemic. This article provides a comprehensive guide to managing insider threats in the remote work era – read on to get started.
Posted: 16 Dec 2020 | Published: 16 Dec 2020

Microsoft

Atakama’s File Encryption Will Prevent Ransomware Exfiltration Threats
sponsored by Atakama
RESOURCE: Ransomware attacks have escalated in recent years to include newer, more devious techniques, like file exfiltration. This article looks at why ransomware is escalating and offers best practices for protecting your organizations from these attacks – read on to get started.
Posted: 09 Dec 2020 | Published: 16 Jun 2020

Atakama

Dealing with VUCA
sponsored by InteliSecure
EGUIDE: Today’s IT and security leaders are responsible for dealing with VUCA – volatility, uncertainty, complexity, and ambiguity – and address data security risks in an ever-changing landscape. Read this InteliSecure e-guide to address the elements of VUCA and build agile data protection.
Posted: 30 Dec 2020 | Published: 30 Dec 2020

InteliSecure

Protecting Healthcare Data With Removable Media Container Encryption
sponsored by WinMagic
CASE STUDY: Healthcare professionals are facing the growing challenge of balancing the security of patient data with ease of authorized access. Read this case study to see how one healthcare institution was able to achieve effective data management across various devices without sacrificing functionality.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

WinMagic

See More, Know More, Do More With Cloud Security Posture Management
sponsored by AWS & CrowdStrike
VIDEO: Cloud security isn’t where it needs to be in terms of safeguarding critical data against today’s attackers. In this webinar, explore the shortcomings of today’s cloud security strategies and learn more about CrowdStrike’s approach to securing the cloud by increasing visibility – watch now to get started.
Posted: 18 Dec 2020 | Premiered: 18 Dec 2020

AWS & CrowdStrike

Protect Sensitive Information by Deterring Print & Screen Capture Behaviors
sponsored by Fasoo
PRESENTATION: While more than half of organizations have experienced a print-related data breach, less than a quarter have made strides to implement secure printing initiatives. Read this report to learn more about print-related risks that lead to data breaches and how to protect your organization against these growing threats.
Posted: 15 Dec 2020 | Published: 15 Dec 2020

Fasoo

5 Types of Insider Threats and How to Detect Them in Your ERP System
sponsored by Appsian
RESOURCE: Although insider threats are the leading cause of the majority (57%) of data breaches, organizations often overlook these threats and focus their efforts on defending against external attacks. Read this blog post and discover the 5 most common insider threats and how to detect them in your ERP system.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Appsian

Deliver Workspace Security & Zero Trust With Citrix + Google Cloud
sponsored by Citrix
PRODUCT OVERVIEW: 2020 was a prime example of the need for flexible, secure remote working capabilities. Citrix and Google have been innovating in this space for decades – read this solution brief to learn more about their workspace security and zero trust offering.
Posted: 14 Dec 2020 | Published: 14 Dec 2020

Citrix

6 Factors To Consider In Building Resilience Now
sponsored by Microsoft
RESOURCE: COVID-19 serves as a reminder of the importance of building digital resilience – and while most organizations agree on its importance, there remains confusion on where to invest, how to invest, and how to set goals as they relate to digital resilience. Read this article and discover 6 factors to consider for building digital resilience.
Posted: 17 Dec 2020 | Published: 17 Dec 2020

Microsoft
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info