Encryption Standards Research
-
12 API security best practices
Sponsored by: TechTarget ComputerWeekly.comAs more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.
-
5 types of data security
Sponsored by: TechTarget ComputerWeekly.comBecause no single form of data exists, no single magic-bullet technique can secure all data. A defense-in-depth data security strategy is made up of a combination of tools, techniques and policies. This infographic gives an overview of the must-have data security technologies.
-
Computer Weekly – 18 October 2022: How Russia hacked a former MI6 spy chief
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, Russian hackers leaked emails and documents from British government, military, and intelligence officials – we examine the implications. New EU laws will govern online safety and the use of AI, but what do they mean for organisations? And we look at the growth in checkout-free shopping. Read the issue now.
-
7 NAS encryption best practices to protect data
Sponsored by: TechTarget ComputerWeekly.comNAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.
-
Computer Weekly - 1 February 2022: How Ocado pushes technological boundaries
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to Ocado's CTO about how the e-commerce company pushes technological boundaries. Our latest buyer's guide looks at the importance and technical challenges of data integration. There's a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now.
-
Evaluating Data-centric Protection Solutions
Sponsored by: Comforte AGData is the lifeblood of any organization, and as such, it’s critical that any data-centric protection system works 100% of the time. Moreover, these systems must be vetted so you know you’re getting an agile, yet mission-critical tokenization service. Absorb this guide for evaluating and comparing tokenization solutions.
-
The exploitation of flaws in the HTTPS protocol
Sponsored by: TechTarget ComputerWeekly.comFor both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
-
Data protection rises up business agenda
Sponsored by: TechTarget ComputerWeekly.comThis 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.
-
Fintech & the digital customer experience
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, find out how banks such as Malaysia's RHB are keeping up in the digital age, the state of mobile payments across the APAC region, and why some bankers believe retail banking will be fully automated in just a few years.
-
A Security Assessment of Android Full-disk Encryption
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
-
Computer Weekly – 8 November 2022: How the US-China chip war will affect IT leaders
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as the US ramps up semiconductor sanctions on China, we examine the ramifications across the tech sector. Cyber criminals are turning to new forms of encryption – we talk to the Dutch researchers trying to catch them. And we look at what cloud providers need to do to improve customer experience. Read the issue now.
-
What to Include in an SD-WAN Security Checklist
Sponsored by: CitrixSD-WAN can improve security in many ways. Simply migrating to a viable SD-WAN offering can bring benefits. But SD-WAN also provides security features to protect the traffic it manages, as well as features that protect the offering itself. Read this expert e-guide to uncover 4 different areas where enterprises should consider SD-WAN and security.
-
Finding a Secure Managed File Transfer Tool: Key considerations
Sponsored by: TechTarget SecurityRead this expert guide to explore key considerations that should be reviewed prior to an MFT investment and learn about the advantages of using a solution with enterprise file synchronization and sharing abilities.
-
The State of Cybersecurity and How It Will Evolve
Sponsored by: ALTRDownload this e-guide for an exclusive Q&A with Raluca Ada Popa. Popa is equipped with four degrees from Massachusetts Institute of Technology, two research fellowships and a bevy of awards and merits. In this Q&A Popa discusses the future of data security and the challenges of ensuring adequate defense.
-
Cyber-Risk Strategies and Models for a Post-Perimeter Age
Sponsored by: TechTarget SecurityIn our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.
-
Encryption Hiding Malware in Half of Cyber Attacks
Sponsored by: A10 NetworksA Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks.
-
EU GDPR Compliance Puts Focus on Data Tracking, Encryption
Sponsored by: IvantiIn this e-guide, experts explain why data tracking, encryption and other measures are crucial for GDPR compliance.
-
Enhance Your Endpoint Security Protection
Sponsored by: Trend Micro, Inc.Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.
-
Make Ransomware Attacks Less Dangerous
Sponsored by: Check Point Software Technologies Ltd.It's only a matter of time before a hacker infiltrates your system and holds your files hostage. What then? You can't defeat ransomware, but there are strategies you can adopt to make attacks less dangerous for your organization. Find out what your security options are in this e-guide.
-
Moving Beyond Ad Hoc Mobile Security
Sponsored by: TechTarget SecurityIs security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.
-
Is Your Network Too Flat? Prevent Data Breaches with Segmentation
Sponsored by: TechTarget SecurityHow do you determine if your network is too flat? Without proper network segmentation, attackers can easily move around the network, turning a minor problem into a major disaster. Learn about segmentation strategies that can improve your network security infrastructure in this issue of Information Security.
-
Prevent unauthorized database access with TDE
Sponsored by: Oracle CorporationThis e-guide teaches you about Transparent Data Encryption (TDE) and how it prevents unauthorized personnel from accessing your database. You will learn how TDE encrypts data as it's written to storage and decrypts it when accessed by authorized users.
-
Can A Subscription Ease SSL Certificate Management?
Sponsored by: Symantec Website SecurityThis e-guide shows the benefits and disadvantages of HTTPS vs. SSL web encryption.
-
Your data on the move: secure mobile devices in your network
Sponsored by: VeraIn this e-guide, you will discover the proper methods to secure emerging enterprise hardware such as iPads, netbooks and more.
-
Encryption's Risks, Benefits, and Roles in SSL Attacks
Sponsored by: Symantec Website SecurityIn this e-guide, expert Nick Lewis details ways to defend against SSL attacks. First, you'll uncover how to detect SSL attacks by inspecting network connections for anomalies. Next, you'll learn the importance of decoding SSL connections to further enable their detection and, ultimately, their mitigation.