Electronic Security Reports

Computer Weekly – 26 September 2023: Preparing for post-quantum cryptography
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide assesses the challenges for cryptography in the emerging era of quantum computing. Google Cloud experts explain how the internet giant is preparing its datacentres for a world of AI. And we examine the privacy, compliance and backup issues from generative AI. Read the issue now.
Posted: 22 Sep 2023 | Published: 26 Sep 2023

TechTarget ComputerWeekly.com

Royal Holloway: An enhanced approach for USB security management
sponsored by TechTarget ComputerWeekly.com
RESOURCE: USB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.
Posted: 08 Feb 2021 | Published: 03 Jul 2020

TechTarget ComputerWeekly.com

Computer Weekly – 2 May 2017: How to deal with data under GDPR
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.
Posted: 08 Feb 2021 | Published: 02 May 2017

TechTarget ComputerWeekly.com

Clearswift Government Communications 2.0
sponsored by Clearswift
WHITE PAPER: In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
Posted: 08 Nov 2013 | Published: 31 Aug 2013

Clearswift

Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths
sponsored by Symantec Website Security Solutions
WHITE PAPER: As a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

Symantec Website Security Solutions

Information Security Magazine – June 2010: Laptop Lockdown
sponsored by Information Security Magazine
EZINE: This month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and a debate over hiring convicted hackers. Read these great articles and more in this month’s issue.
Posted: 16 Jun 2010 | Published: 16 Jun 2010

Information Security Magazine

CipherCloud for Office 365 - Encryption Solution Demo
sponsored by CipherCloud
WEBCAST: In just five minutes, we'll show you how you can transparently encrypt and protect all of your sensitive email, calendar, and contact information in Exchange Online and Hosted Exchange to eliminate concerns about about data privacy, residency, security, and compliance.
Posted: 13 Aug 2012 | Premiered: Aug 13, 2012

CipherCloud

SQL Server Migration
sponsored by Dell and Microsoft SQL
EGUIDE: This E-Guide explores some of the basic steps to ensure a successful migration, as well as the features you'll want to take advantage of right away and 3 key tips for making the process smoother. Uncover some of the less popular - but no less important - changes to the latest version of SQL Server.
Posted: 30 Jun 2011 | Published: 29 Jun 2011

Dell and Microsoft SQL

Top Mobile Data Protection Best Practices
sponsored by TechTarget Security
EGUIDE: Mobile data protection is an extremely relevant topic in this day and age. With people now combining their work phones with their personal phones, important data is at risk in multiple ways. Check out this expert E-Guide and learn about the top five ways to secure your phone and make sure your personal and work information stays yours.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

TechTarget Security

Essential Enterprise Mobile Security Controls
sponsored by TechTarget Security
EGUIDE: How will you defend your organization from the threats posed by mobile devices? This expert E-Guide will help you understand the tools and controls you should be implementing to maintain security and protect sensitive data.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

TechTarget Security