Standards  >   Security Standards  >  

Wireless Encryption

RSS Feed   
Wireless Encryption Reports
 
10 Opportunities for MSPs and MSSPs to Deliver MDR Services
sponsored by AT&T Cybersecurity
RESOURCE: For service providers, the Managed Detection and Response (MDR) trend creates an opportunity to stay competitive and add value that helps clients defend and respond to cyber threats. Read about 10 opportunities to embrace and deliver competitive MDR services.
Posted: 08 Jul 2019 | Published: 08 Jul 2019

AT&T Cybersecurity

Proper Backup: The Last Line of Defense Against Ransomware and Cybercrime
sponsored by Unitrends
WHITE PAPER: This paper examines how different backup approaches cope, or fail to cope, with recovering from ransomware. Download it now to examine them for yourself and to ensure your customers' data is fully protected.
Posted: 01 May 2019 | Published: 01 May 2019

Unitrends

Unified Communication: “It should work as easily as a telephone call!”
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 15 May 2017 | Published: 15 May 2017

ComputerWeekly.com

Gentek Global Secures Payment Systems with Application Shielding
sponsored by Intertrust
CASE STUDY: In this case study, discover how Gentek, a payment systems security company, partnered with Intertrust to deploy robust application shielding for its payment systems in order to protect user data and adhere to regulatory requirements of the payments industry.
Posted: 16 Dec 2019 | Published: 16 Dec 2019

Intertrust

How ThreatConnect Leverages DNSDB to Track Down Grizzly Steppe
sponsored by Farsight Security
CASE STUDY: Find out how ThreatConnect used a passive DNS database intelligence approach to extend Grizzly Steppe data from the Joint Analysis Report and discover new indicators that expose cyberespionage activity.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

Farsight Security

The exploitation of flaws in the HTTPS protocol
sponsored by ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 16 Apr 2019 | Published: 16 Apr 2019

ComputerWeekly.com

Your App Security Stack: How to Defend Against the Evolving Threat
sponsored by Arxan
WEBCAST: In this webcast, Ken Jochims from Arxan sits down with Forrester Research Principal Analyst, Amy DeMartine, to talk about app security and the evolving threat landscape in 2019.
Posted: 15 Feb 2019 | Premiered: Feb 15, 2019

Arxan

Six Criteria for Buying Data Loss Prevention Products
sponsored by InteliSecure
EGUIDE: Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

Introduction to Data Loss Prevention Tools
sponsored by InteliSecure
EGUIDE: In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

SSL: Get the Best for You and Mitigate Vulnerabilities
sponsored by A10 Networks
EGUIDE: Inside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.
Posted: 05 Jun 2017 | Published: 30 May 2017

A10 Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info