ComputerWeekly.com Research Library

Powered by Bitpipe.com

Encryption Standards Research

  • Keeping the Keys to Your Cloud Future Secure

    Sponsored by: Entrust, Inc.

    Discover the key challenge and key enabler of digital business safely migrating to the cloud and ensuring the right people have the right keys, privileges and certificates, while keeping them out of the hands of hackers.

  • The History of Ransomware

    Sponsored by: KnowBe4

    Learn a brief history of ransomware, its evolution and the different malware families it's been a part of. By understanding where ransomware came from and how it's attacked in the past, you can best predict where it's going in the future and design an effective defense strategy for your organization.

  • Ransomware: A Hostage Rescue Manual

    Sponsored by: KnowBe4

    Learn the different types of ransomware, how to spot them and how to prevent an attack against your files. Should you become infected, learn the steps you must take to best protect your assets and how to avoid future ransomware attacks.

  • Ransomware: 3 Seconds to Encryption

    Sponsored by: Arctic Wolf Networks, Inc.

    Discover eye-opening ransomware statistics and figures in this short infographic. You'll learn just how rampant the ransomware problem has become among small businesses, but also discover how you can protect your organization to combat ransomware effectively.

  • Enhance Your Endpoint Security Protection

    Sponsored by: TrendMicro

    Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.

  • Staying Secure in the Cloud Is a Shared Responsibility

    Sponsored by: evident.io

    The increasing popularity of public clouds requires CISOs to develop effective security strategies to ensure proper levels of security for enterprise operations within the public cloud. This Gartner report provides clear guidelines for defining and allocating responsibility for security planning and operations in IaaS, PaaS and SaaS environments.

  • A Security Assessment of Android Full-disk Encryption

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.

  • Is Your Network Too Flat? Prevent Data Breaches with Segmentation

    Sponsored by: SearchSecurity.com

    How do you determine if your network is too flat? Without proper network segmentation, attackers can easily move around the network, turning a minor problem into a major disaster. Learn about segmentation strategies that can improve your network security infrastructure in this issue of Information Security.

  • The 5 Features You Absolutely, Positively Must Have to Secure Your Mobile Endpoints

    Sponsored by: Commvault

    This white paper presents 5 critical security features that you need to confidently secure mobile devices and protect against would-be thieves and hackers – and forgetful employees.

  • Reconsidering PKI and its Place in your Enterprise Encryption Strategy

    Sponsored by: ComputerWeekly.com

    Organisations need to re-think how to implement security across a range of devices, rather than settling for patchwork variations of PKI and commissioning deployments across the internet of things, this report from Omlis argues.

  • 10 Things Security Experts Wish End Users Knew

    Sponsored by: Global Knowledge

    In this white paper, you'll learn the 10 concerns that security experts want end users to know about security at work and at home.

  • Make Ransomware Attacks Less Dangerous

    Sponsored by: Check Point Software Technologies Ltd.

    It's only a matter of time before a hacker infiltrates your system and holds your files hostage. What then? You can't defeat ransomware, but there are strategies you can adopt to make attacks less dangerous for your organization. Find out what your security options are in this e-guide.

  • Moving Beyond Ad Hoc Mobile Security

    Sponsored by: SearchSecurity.com

    Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.

  • Prevent unauthorized database access with TDE

    Sponsored by: Oracle Corporation

    This e-guide teaches you about Transparent Data Encryption (TDE) and how it prevents unauthorized personnel from accessing your database. You will learn how TDE encrypts data as it's written to storage and decrypts it when accessed by authorized users.

  • Can A Subscription Ease SSL Certificate Management?

    Sponsored by: Symantec Website Security

    This e-guide shows the benefits and disadvantages of HTTPS vs. SSL web encryption.

  • Your data on the move: secure mobile devices in your network

    Sponsored by: Vera

    In this e-guide, you will discover the proper methods to secure emerging enterprise hardware such as iPads, netbooks and more.

  • Uncover Threats in Network Traffic: The Ultimate Guide to SSL Inspection

    Sponsored by: A10 Networks

    Don't let hackers evade your network defenses through encrypted traffic. Access this resource and learn ways to gain insight into encrypted data by decrypting inbound and outbound SSL traffic.

  • Encryption's Risks, Benefits, and Roles in SSL Attacks

    Sponsored by: Symantec Website Security

    In this e-guide, expert Nick Lewis details ways to defend against SSL attacks. First, you'll uncover how to detect SSL attacks by inspecting network connections for anomalies. Next, you'll learn the importance of decoding SSL connections to further enable their detection and, ultimately, their mitigation.

  • How One Airborne Wi-Fi Provider Issued Fake Google SSL Certificates, and Faced the Consequences

    Sponsored by: Symantec Website Security

    This e-guide features a case study on how Gogo LLC issued fake Google SSL certificates. Learn how this incident caused ripples in the security industry, and uncover ways some vendors are increasingly observing encrypted traffic.

  • SSL/TLS Visibility: Determining Your Network Security Blind Spot Cost

    Sponsored by: Blue Coat Systems

    This white paper will assist you in calculating the cost of leaving the SSL/TLS network security blind spot open to hackers and presents strategies to mitigate risks.

  • State of File Collaboration Security

    Sponsored by: FinalCode

    Access this research report on file collaboration security for insights into file data leakage risks, security processes and control maturity, perceived cloud-based file platform threats, and more.

  • Secure, Efficient File-Sharing

    Sponsored by: FinalCode

    This brief video looks at a security system that keeps files safe without altering the way employees share them.

  • Security and Privacy on the Encrypted Network

    Sponsored by: Blue Coat Systems

    This white paper discusses the challenges of decryption and gives advice on how you can implement it more effectively.

  • Network Encryption and its Impact on Security

    Sponsored by: Blue Coat Systems

    This research report looks at the prevalence of network traffic encryption and decryption, examining the challenges these practices present

  • Sorting Storage Options on AWS

    Sponsored by: SearchAWS

    Sorting through AWS Data Storage options is no small task. With a little background, however, you can successfully -- and securely -- choose the right option for your company.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.