Encryption Security Reports

CW Europe – December 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
Posted: 08 Feb 2021 | Published: 13 Dec 2018

TechTarget ComputerWeekly.com

2 types of endpoint encryption to protect data
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.
Posted: 04 May 2022 | Published: 04 May 2022

TechTarget ComputerWeekly.com

Computer Weekly – 9 May 2017: Casting the IT skills net wider
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 May 2017

TechTarget ComputerWeekly.com

Data Security and Privacy Concerns Pushed into the Spotlight
sponsored by GeoTrust, Inc.
EGUIDE: In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

GeoTrust, Inc.

Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
sponsored by GeoTrust, Inc.
EGUIDE: This expert e-guide describes the dangerous vulnerabilities that can arise from insecure Secure Socket Layer (SSL) usage, and details essential tips and strategies for properly implementing and configuring SSL in order to ensure Web security.
Posted: 27 Dec 2012 | Published: 19 Dec 2012

GeoTrust, Inc.

Data Loss Prevention: RFP Technology Decisions
sponsored by TechTarget Security
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

TechTarget Security

IT in Europe - May 2012
sponsored by TechTarget Security
EZINE: While network access control (NAC) technology seemed to disappear into the great beyond just a year ago, it is ready to resurface with a vengeance. However, the technology will need to resurge with better controls, especially as the consumerisation of IT and bring your own device (BYOD) trends overtake the enterprise.
Posted: 22 Jun 2012 | Published: 15 Jun 2012

TechTarget Security

Oracle Database - The best choice for PeopleSoft Applications
sponsored by Oracle Corporation
WHITE PAPER: This white paper discusses the business and technology reasons behind customers' continued choice of Oracle Database for their PeopleSoft application deployments.
Posted: 08 Jun 2011 | Published: 30 Apr 2010

Oracle Corporation

CA ARCserve Backup r12.5 Security Features
sponsored by arcserve
VIDEO: Check out this demonstration for an explanation of CA ARCserve Backup r12.5 security features. This video offers detailed instructions on how to use the security features, including encryption and administration console.
Posted: 28 May 2010 | Premiered: 28 May 2010

arcserve

Cloud-Based Data Protection
sponsored by Iron Mountain
DATA SHEET: To cope with growing data protection challenges, organizations are turning to cloud-based data protection for relief. Organizations are discovering that the sooner cloud-based data protection appears in their processes, the greater the benefits.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Iron Mountain