Encryption Standards Research
-
7 NAS encryption best practices to protect data
Sponsored by: ComputerWeekly.comNAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.
-
Computer Weekly - 1 February 2022: How Ocado pushes technological boundaries
Sponsored by: ComputerWeekly.comIn this week's Computer Weekly, we talk to Ocado's CTO about how the e-commerce company pushes technological boundaries. Our latest buyer's guide looks at the importance and technical challenges of data integration. There's a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now.
-
Evaluating Data-centric Protection Solutions
Sponsored by: Comforte AGData is the lifeblood of any organization, and as such, it’s critical that any data-centric protection system works 100% of the time. Moreover, these systems must be vetted so you know you’re getting an agile, yet mission-critical tokenization service. Absorb this guide for evaluating and comparing tokenization solutions.
-
The exploitation of flaws in the HTTPS protocol
Sponsored by: ComputerWeekly.comFor both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
-
Data protection rises up business agenda
Sponsored by: ComputerWeekly.comThis 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.
-
Fintech & the digital customer experience
Sponsored by: ComputerWeekly.comIn this e-guide, find out how banks such as Malaysia's RHB are keeping up in the digital age, the state of mobile payments across the APAC region, and why some bankers believe retail banking will be fully automated in just a few years.
-
A Security Assessment of Android Full-disk Encryption
Sponsored by: ComputerWeekly.comThis article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
-
What to Include in an SD-WAN Security Checklist
Sponsored by: CitrixSD-WAN can improve security in many ways. Simply migrating to a viable SD-WAN offering can bring benefits. But SD-WAN also provides security features to protect the traffic it manages, as well as features that protect the offering itself. Read this expert e-guide to uncover 4 different areas where enterprises should consider SD-WAN and security.
-
Finding a Secure Managed File Transfer Tool: Key considerations
Sponsored by: SearchSecurity.comRead this expert guide to explore key considerations that should be reviewed prior to an MFT investment and learn about the advantages of using a solution with enterprise file synchronization and sharing abilities.
-
The State of Cybersecurity and How It Will Evolve
Sponsored by: ALTRDownload this e-guide for an exclusive Q&A with Raluca Ada Popa. Popa is equipped with four degrees from Massachusetts Institute of Technology, two research fellowships and a bevy of awards and merits. In this Q&A Popa discusses the future of data security and the challenges of ensuring adequate defense.
-
Cyber-Risk Strategies and Models for a Post-Perimeter Age
Sponsored by: SearchSecurity.comIn our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.
-
Encryption Hiding Malware in Half of Cyber Attacks
Sponsored by: A10 NetworksA Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks.
-
EU GDPR Compliance Puts Focus on Data Tracking, Encryption
Sponsored by: IvantiIn this e-guide, experts explain why data tracking, encryption and other measures are crucial for GDPR compliance.
-
Enhance Your Endpoint Security Protection
Sponsored by: Trend Micro, Inc.Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.
-
Make Ransomware Attacks Less Dangerous
Sponsored by: Check Point Software Technologies Ltd.It's only a matter of time before a hacker infiltrates your system and holds your files hostage. What then? You can't defeat ransomware, but there are strategies you can adopt to make attacks less dangerous for your organization. Find out what your security options are in this e-guide.
-
Moving Beyond Ad Hoc Mobile Security
Sponsored by: SearchSecurity.comIs security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.
-
Is Your Network Too Flat? Prevent Data Breaches with Segmentation
Sponsored by: SearchSecurity.comHow do you determine if your network is too flat? Without proper network segmentation, attackers can easily move around the network, turning a minor problem into a major disaster. Learn about segmentation strategies that can improve your network security infrastructure in this issue of Information Security.
-
Prevent unauthorized database access with TDE
Sponsored by: Oracle CorporationThis e-guide teaches you about Transparent Data Encryption (TDE) and how it prevents unauthorized personnel from accessing your database. You will learn how TDE encrypts data as it's written to storage and decrypts it when accessed by authorized users.
-
Can A Subscription Ease SSL Certificate Management?
Sponsored by: Symantec Website SecurityThis e-guide shows the benefits and disadvantages of HTTPS vs. SSL web encryption.
-
Your data on the move: secure mobile devices in your network
Sponsored by: VeraIn this e-guide, you will discover the proper methods to secure emerging enterprise hardware such as iPads, netbooks and more.
-
Encryption's Risks, Benefits, and Roles in SSL Attacks
Sponsored by: Symantec Website SecurityIn this e-guide, expert Nick Lewis details ways to defend against SSL attacks. First, you'll uncover how to detect SSL attacks by inspecting network connections for anomalies. Next, you'll learn the importance of decoding SSL connections to further enable their detection and, ultimately, their mitigation.
-
How One Airborne Wi-Fi Provider Issued Fake Google SSL Certificates, and Faced the Consequences
Sponsored by: Symantec Website SecurityThis e-guide features a case study on how Gogo LLC issued fake Google SSL certificates. Learn how this incident caused ripples in the security industry, and uncover ways some vendors are increasingly observing encrypted traffic.
-
Sorting Storage Options on AWS
Sponsored by: SearchAWSSorting through AWS Data Storage options is no small task. With a little background, however, you can successfully -- and securely -- choose the right option for your company.
-
How to Properly Move into the Cloud
Sponsored by: Forum SystemsThis e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.
-
Symantec Data Loss Prevention for Mobile
Sponsored by: Symantec CorporationThis webcast introduces the highest-rated DLP solution with industry-leading detection technology.