ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Encryption Research

  • Selecting Your Next-Generation Firewall Solution

    Sponsored by: Fortinet, Inc.

    As security architects consider how to provide comprehensive threat protection for their enterprises, they face a confusing array of feature sets and vendor claims lacking complete specifications and/or standards-based performance metrics. View this NGFW white paper so that you may approach your CISO with a well-informed recommendation.

  • Data Security in Australia and New Zealand 2020

    Sponsored by: Thales

    Organizations in Australia and New Zealand are rapidly innovating their business models. This means more sensitive data to be created, collected and shared.The downside? This new data could be a gold mine for cybercriminals. How can businesses adapt to stay secure?To find out, read this report on the state of data security in the ANZ region.

  • How to De-Identify Sensitive Data with Libelle DataMasking

    Sponsored by: Libelle

    You’ve heard of data quality, but what about data masking? This e-book digs into the data masking essentials and will demystify the topic. Access now to learn how to apply data masking to analytics and see an example in action.

  • Advanced Data Obfuscation with Libelle DataMasking

    Sponsored by: Libelle

    Obfuscating sensitive data like credit card information or social security numbers is no longer just a moral responsibility for many companies—it’s now becoming a legal requirement. Read this white paper to learn what, exactly, data masking is and how you can use it to protect and secure data even as you make it available for analytics purposes.

  • Thales adds data discovery and classification to its growing data security and encryption empire

    Sponsored by: Thales

    In this 451 Research report, learn about Thales’s addition of data discovery, classification and risk analysis to its existing line of data security, encryption and key management offerings, in part to help address the growing convergence of requirements for data security and data privacy.

  • Protecting Sensitive Data in and Around an Oracle Database

    Sponsored by: Thales

    When planning to secure sensitive data in an Oracle database, enterprises need to consider that sensitive data may reside in unanticipated locations outside of the database itself. Robust data security includes considering how to secure sensitive data surrounding the Oracle database. Read on to learn how to get started.

  • Royal Holloway: An enhanced approach for USB security management

    Sponsored by: ComputerWeekly.com

    USB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.

  • CW APAC, June 2020: Trend Watch - data protection

    Sponsored by: ComputerWeekly.com

    Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.

  • Computer Weekly – 1 October 2019: The most influential women in UK technology

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology. Meet the winner, Debbie Forster, CEO of Tech Talent Charter, and find out who are this year's five rising stars. Also, our latest buyer's guide looks at the latest developments in robotic process automation. Read the issue now.

  • Computer Weekly – 6 August 2019: Using tech to boost staff morale

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at the emerging technologies being used to improve employee experience and raise staff loyalty and motivation. The CIO of the Football Association explains how IT is changing the way the national game is administered. And we examine the growing role of AI in preventing cyber attacks. Read the issue now.

  • Empowering Big Data in a Data-driven Economy

    Sponsored by: Comforte AG

    Fewer things have been more transformational in IT than the rise of Big Data. It has given organizations the ability to use, monetize, and learn from data. However, bad actors also know the value of data so the threats are real. In this white paper, learn how to protect your most valuable asset: data.

  • CW Europe – December 2018

    Sponsored by: ComputerWeekly.com

    Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.

  • The Ultimate Guide to Data Encryption in the Cloud

    Sponsored by: Rubrik

    In this guide, you'll learn the basics of encryption, the prerequisites of data confidentiality, key management, and data encryption in the top tier public clouds. Discover how this can enhance your intelligent data encryption strategy at your organization, today.

  • The APAC Guide to Data Protection & GDPR

    Sponsored by: ComputerWeekly.com

    In this e-guide, learn more about what governments in APAC are doing to keep companies on their toes in securing personal data, what organisations can do to stem potential data issues and the implications of the European Union's upcoming General Data Protection Regulation (GDPR) on businesses in the region.

  • The Investigatory Powers Act 2016 and Internet Connections Records

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.

  • Computer Weekly – 9 May 2017: Casting the IT skills net wider

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.

  • Computer Weekly – 2 May 2017: How to deal with data under GDPR

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.

  • Data protection: Not just about personal data and compliance

    Sponsored by: ComputerWeekly.com

    Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.

  • Jargon buster guide to GDPR

    Sponsored by: ComputerWeekly.com

    In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.

  • IT Project: Storage Architecture ANZ

    Sponsored by: ComputerWeekly.com

    When it comes to storage, there are usually two main factors to consider – cost and performance. However, every organisation has its own unique set of requirements and this will inevitably shape their storage strategy. Inside this guide, we look at some examples of the strategies organisations are adopting to effectively store and manage data.

  • Targeted cyber attacks in the UK and Europe

    Sponsored by: ComputerWeekly.com

    This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.

  • Cloud-based backup services are a safety net in tricky times

    Sponsored by: SearchDataBackup.com

    Use this handbook to explore how cloud backup can help you better secure your information against ransomware, 5 critical questions to ask a cloud vendor before adopting, and the benefits merging your backup and disaster recovery services provides.

  • GDPR Developments Will Dominate Storage and Compliance in 2017

    Sponsored by: Arrow + NetApp

    In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.

  • Tips for Finding a Compliant DaaS Platform and 3 Security Features to Look for in a Provider

    Sponsored by: Nerdio

    Finding a compliant DaaS platform isn't always easy. Every organization has their own unique requirements when it comes to compliance and security needs. Use this e-guide to discover tips for finding a platform that meets your organization's needs, and discover 3 security features to look for in a provider.

  • Five Windows 10 security risks that are easy to overlook

    Sponsored by: vmware airwatch

    As more organizations upgrade from Windows 7, the time is right to think about how to create the perfect Windows 10 security setup. But before upgrading to Windows 10, understand these 5 security risks that are easy to overlook.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.