Cryptography Standards Reports

Computer Weekly - 1 February 2022: How Ocado pushes technological boundaries
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to Ocado's CTO about how the e-commerce company pushes technological boundaries. Our latest buyer's guide looks at the importance and technical challenges of data integration. There's a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now.
Posted: 28 Jan 2022 | Published: 01 Feb 2022

TechTarget ComputerWeekly.com

Computer Weekly – 18 October 2022: How Russia hacked a former MI6 spy chief
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, Russian hackers leaked emails and documents from British government, military, and intelligence officials – we examine the implications. New EU laws will govern online safety and the use of AI, but what do they mean for organisations? And we look at the growth in checkout-free shopping. Read the issue now.
Posted: 17 Oct 2022 | Published: 18 Oct 2022

TechTarget ComputerWeekly.com

Make Ransomware Attacks Less Dangerous
sponsored by Check Point Software Technologies Ltd.
EGUIDE: It's only a matter of time before a hacker infiltrates your system and holds your files hostage. What then? You can't defeat ransomware, but there are strategies you can adopt to make attacks less dangerous for your organization. Find out what your security options are in this e-guide.
Posted: 14 Jun 2016 | Published: 08 Jun 2016

Check Point Software Technologies Ltd.

UCB Gains Efficiencies and Realizes Lower TCO with CallCopy Call Recording
sponsored by NACR
CASE STUDY: Uncover why a implementing a CallCopy recording solution that is easy to use, search, update, support and maintain can offer a lower TCO than other solutions, as well as fulfilling all your call recording needs.
Posted: 10 Feb 2012 | Published: 10 Feb 2012

NACR

Finding a Secure Managed File Transfer Tool: Key considerations
sponsored by TechTarget Security
EBOOK: Read this expert guide to explore key considerations that should be reviewed prior to an MFT investment and learn about the advantages of using a solution with enterprise file synchronization and sharing abilities.
Posted: 01 Jun 2020 | Published: 01 Jun 2020

TechTarget Security

Building the Right Mobile Security Toolkit
sponsored by TechTarget Security
EGUIDE: Due to the rapid proliferation of mobile security threats, it’s critical that organizations put a new emphasis on their mobile device security strategies. This expert tip explores today’s threats to mobile devices and offers suggestions for building the right mobile security toolkit to prevent them from doing harm.
Posted: 01 Jun 2011 | Published: 01 Jun 2011

TechTarget Security

Presentation Download: Data Protection Strategies: Data Encryption
sponsored by CDW Healthcare
PRESENTATION TRANSCRIPT: If data is encrypted, health care providers are not subject to new, strict data breach notification laws. Server, storage and network encryption adds yet another layer of protection. So why do so many organizations avoid encryption? This presentation download will cover the basics of encryption and explain why its benefits outweigh its costs.
Posted: 25 Oct 2011 | Published: 25 Oct 2011

CDW Healthcare

Cloud Security Designed for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
Posted: 19 May 2014 | Published: 19 May 2014

Trend Micro

BYOPC Strategy: Policies and Problem Solving
sponsored by TechTarget Security
EGUIDE: Creating a bring your own PC (BYOPC) policy before implementation is crucial to the success of the initiative. In this E-Guide from SearchConsumerization.com, get help creating a policy that fulfills your employees' and your organizations' needs alike.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

TechTarget Security

Can A Subscription Ease SSL Certificate Management?
sponsored by Symantec Website Security
EGUIDE: This e-guide shows the benefits and disadvantages of HTTPS vs. SSL web encryption.
Posted: 16 Feb 2016 | Published: 10 Feb 2016

Symantec Website Security