Standards  >   Security Standards  >  

Wireless Encryption

RSS Feed   
Wireless Encryption Reports
 
Risktech 100 2021
sponsored by MetricStream
RESEARCH CONTENT: Changes in the risk and compliance landscape were accelerated last year, likely due to the spread of COVID-19 – So what will the technology trends, security threat types and emerging offerings in this landscape look like in 2021? Read this exclusive RiskTech 100 research report to find out.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

MetricStream

GoSecure Cybersecurity Perceptions Versus Reality
sponsored by GoSecure
WHITE PAPER: This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
Posted: 16 Sep 2020 | Published: 16 Sep 2020

GoSecure

Achieving Security and Compliance for SAP HANA in the Cloud
sponsored by Thales
PRODUCT OVERVIEW: Although widely used for storing and processing sensitive data, achieving security and compliance for SAP HANA in the cloud goes beyond the scope of traditional security methods. Download this white paper to discover how Thales is addressing this trending issue.
Posted: 09 Jul 2020 | Published: 29 Feb 2020

Thales

Achieving HIPAA Compliance
sponsored by Absolute Software Corporation
WHITE PAPER: The HITECH Act of 2013 expanded who was considered a covered entity (CE) when it came to HIPAA compliance. This whitepaper provides an introductory overview of key consideration areas and guidance for getting started to help your organization avoid HIPAA and HITECH penalties – download now to get started.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

Absolute Software Corporation

Security Think Tank: Biden's Cyber Security Plan
sponsored by ComputerWeekly.com
EGUIDE: As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

ComputerWeekly.com

A Security Engineer’s Nightmare
sponsored by Cribl.io
WHITE PAPER: For security pros, preventing breaches and ensuring data privacy is hectic enough – having an incompetent system on top of these challenges can introduce new levels of stress. Read this white paper to learn how Cribl is helping security engineers log information and incidents so they can focus their efforts on more important tasks.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Cribl.io

CipherTrust Cloud Key Manager for Multi-cloud Environments - White Paper
sponsored by Thales
WHITE PAPER: The era of multi-cloud environments has enabled unmatched scalability and productivity. However, in order to optimize these capabilities, organizations need to restructure their approaches to data protection and key management. Download this report for a closer look at Thales’ CipherTrust Cloud Key Manager for multi-cloud environments.
Posted: 05 Aug 2020 | Published: 31 Jul 2020

Thales

Shor's Algorithm
sponsored by Thales
WEBCAST: While quantum computing presents a tremendous opportunity, it’s not without its risks. This webinar highlights the security implications of quantum computing, including the potential cyber threats that may be used by hackers and how organizations can address them. Watch now to learn more about the quantum threat.
Posted: 08 Jul 2020 | Premiered: Jul 8, 2020

Thales

How do you solve a problem like security training?
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
Posted: 17 May 2021 | Published: 17 May 2021

ComputerWeekly.com

Protecting Intellectual Property with Data Access Governance
sponsored by SailPoint Technologies
PRODUCT OVERVIEW: In order to protect your organization’s sensitive intellectual property (IP), it’s paramount to know who has access to it, and what those users are doing with that access. Download this solution brief for more on protecting your IP and discover how SailPoint’s identity governance and data access management offerings may be able to help.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

SailPoint Technologies
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2022, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences