EZINE:
Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
INFOGRAPHIC:
Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.
EZINE:
In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.
EGUIDE:
In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.
EGUIDE:
This expert e-guide describes the dangerous vulnerabilities that can arise from insecure Secure Socket Layer (SSL) usage, and details essential tips and strategies for properly implementing and configuring SSL in order to ensure Web security.
EBOOK:
This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
EZINE:
While network access control (NAC) technology seemed to disappear into the great beyond just a year ago, it is ready to resurface with a vengeance. However, the technology will need to resurge with better controls, especially as the consumerisation of IT and bring your own device (BYOD) trends overtake the enterprise.
WHITE PAPER:
This white paper discusses the business and technology reasons behind customers' continued choice of Oracle Database for their PeopleSoft application deployments.
VIDEO:
Check out this demonstration for an explanation of CA ARCserve Backup r12.5 security features. This video offers detailed instructions on how to use the security features, including encryption and administration console.
DATA SHEET:
To cope with growing data protection challenges, organizations are turning to cloud-based data protection for relief. Organizations are discovering that the sooner cloud-based data protection appears in their processes, the greater the benefits.