Encryption Standards Research
-
SSL Certificate Management: Common Mistakes and How to Avoid Them
Sponsored by: TechTarget SecurityErrors are bound to occur when SSL certificate management is handled manually. Learn how to avoid these common mistakes by reading this expert e-guide by penetration tester at First Base Technologies, Rob Shapland.
-
Moving Beyond Ad Hoc Mobile Security
Sponsored by: TechTarget SecurityIs security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.
-
Is Your Network Too Flat? Prevent Data Breaches with Segmentation
Sponsored by: TechTarget SecurityHow do you determine if your network is too flat? Without proper network segmentation, attackers can easily move around the network, turning a minor problem into a major disaster. Learn about segmentation strategies that can improve your network security infrastructure in this issue of Information Security.
-
Prevent unauthorized database access with TDE
Sponsored by: Oracle CorporationThis e-guide teaches you about Transparent Data Encryption (TDE) and how it prevents unauthorized personnel from accessing your database. You will learn how TDE encrypts data as it's written to storage and decrypts it when accessed by authorized users.
-
Can A Subscription Ease SSL Certificate Management?
Sponsored by: Symantec Website SecurityThis e-guide shows the benefits and disadvantages of HTTPS vs. SSL web encryption.
-
Your data on the move: secure mobile devices in your network
Sponsored by: VeraIn this e-guide, you will discover the proper methods to secure emerging enterprise hardware such as iPads, netbooks and more.
-
Encryption's Risks, Benefits, and Roles in SSL Attacks
Sponsored by: Symantec Website SecurityIn this e-guide, expert Nick Lewis details ways to defend against SSL attacks. First, you'll uncover how to detect SSL attacks by inspecting network connections for anomalies. Next, you'll learn the importance of decoding SSL connections to further enable their detection and, ultimately, their mitigation.
-
How One Airborne Wi-Fi Provider Issued Fake Google SSL Certificates, and Faced the Consequences
Sponsored by: Symantec Website SecurityThis e-guide features a case study on how Gogo LLC issued fake Google SSL certificates. Learn how this incident caused ripples in the security industry, and uncover ways some vendors are increasingly observing encrypted traffic.
-
Sorting Storage Options on AWS
Sponsored by: TechTarget Search AWSSorting through AWS Data Storage options is no small task. With a little background, however, you can successfully -- and securely -- choose the right option for your company.
-
How to Properly Move into the Cloud
Sponsored by: Forum SystemsThis e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.
-
Symantec Data Loss Prevention for Mobile
Sponsored by: Symantec CorporationThis webcast introduces the highest-rated DLP solution with industry-leading detection technology.
-
Personally Identifiable Information (PII) and Personal Health Information (PHI)
Sponsored by: Voltage Security, Inc.This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
-
Compare Windows 8 and Windows® XP Security Problems
Sponsored by: Lenovo and MicrosoftThis white paper explains the most critical security-related differences between Windows® XP and Windows 8, including each operating system’s ability to provision security patches, integrate with MDM and more.
-
Computer Weekly – 10 June 2014: The case for a European cloud market
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the European Commission wants to create a digital single market in Europe based on industry standard clouds – but is the plan realistic? Network encryption promises to solve many IT security threats – we examine the benefits. And our latest buyer's guide looks at business process management. Read the issue now.
-
Cloud Security Designed for Amazon Web Services (AWS)
Sponsored by: Trend MicroThis white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
-
Top 10 Ways to Assess The Risk of Data Loss
Sponsored by: InfrascaleThis white paper offers 10 signs of whether or not your employees are using free file sharing services and what kinds of risks these pose to your organization's sensitive data.
-
Adapting to the new web security and email security threats
Sponsored by: Cisco Systems, Inc.In this expert e-guide from SearchSecurity.com, industry leaders Karen Scarfone and Nick Lewis offer critical tips to securing email and Web use – given the latest advanced, targeted threats.
-
EMC Isilon Scale-Out NAS and RainStor with Hadoop for Efficient Big Data Management
Sponsored by: RainStor Inc.Many enterprises rely on Hadoop to manage and analyze large volumes of data, and as such, they are looking to deploy the right architecture to optimize compute and storage requirements. The traditional approach is running Hadoop on DAS -- but is there a better way?
-
Dell Data Protection
Sponsored by: DellEMC and Intel®This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
-
NoSQL Does Not Have to Mean No Security
Sponsored by: IBMThis white paper explores the data security and compliance challenges with NoSQL ("not only SQL") databases, and offers key recommendations on how to address these problems.
-
EMC Integration of PKI and Authentication Services for Securing VMWare Vcloud Suite 5.1 Environments
Sponsored by: EMC & ArrowThis Proven Solutions Guide provides procedures for integrating hardened components including VMware vSphere, and unifying the environment's authentication mechanisms with a centralized directory. This guide details a secure multitenant Compute-as-a-Service cloud solution.
-
HIPAA Violations Incur Multi-Million Dollar Penalties
Sponsored by: AbsoluteIn this resource, read about some recent HIPAA breaches that cost the violating parties significant penalties and learn about the measures that can be put in place to help maintain compliance.
-
High Performance, High Capacity 2048/4096-bit SSL Offload February 2013
Sponsored by: A10 NetworksIT professionals are going to great lengths to foster business growth via data encryption. This guide outlines the importance of data protection and encryption, while exploring specific operating systems that provides scalability alongside enhanced performance levels.
-
Who’s Snooping on Your Email?
Sponsored by: SophosThis exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
-
In Control at Layer 2: A Tectonic Shift in Network Security
Sponsored by: SafeNet, Inc.This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.