TrueCrypt
By: TrueCrypt Foundation View more from TrueCrypt Foundation >>
Download this next:
2 types of endpoint encryption to protect data
By: TechTarget ComputerWeekly.com
Type: Infographic
Encryption is the key layer in any data security strategy as it ensures data cannot be read by unauthorized users. Even if multiple layers of protection fail or are breached, encrypted data stays protected.
Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.
These are also closely related to: "TrueCrypt"
-
7 NAS encryption best practices to protect data
By: TechTarget ComputerWeekly.com
Type: eBook
In the hybrid work era, finding efficient ways to protect an enterprise's data is mission-critical. Encryption is one of the most effective tools to protect data on network-attached storage. Even if cybercriminals gain access to the drives or intercept communications to or from them, encryption makes the data unreadable to anyone who does not have the cryptographic key.
NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk.
Here are seven NAS encryption best practices to protect your data.
-
Computer Weekly – 30 January 2024: Tech companies warn EU over encryption plans
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week’s Computer Weekly, tech companies are calling on the European Commission to rethink plans to weaken internet encryption – we explore the issues. We talk to credit rating agency Moody’s about why it thinks now is the time to start investing in quantum computing. And we examine how a different approach to recruitment could ease the datacentre sector skills gap. Read the issue now.
Find more content like what you just read:
-
A Security Assessment of Android Full-disk Encryption
By: TechTarget ComputerWeekly.com
Type: eGuide
This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
-
How Russia's war in Ukraine is changing the cybersecurity game and why that matters
By: TechTarget ComputerWeekly.com
Type: eGuide
The build-up to the attack on Ukraine by Russia saw warnings from security pros that the world was on the verge of a cyber war. So far, such attacks have been confined to the theatre of conflict, but this doesn't mean things won't change. In this e-guide, we explore some of the more impactful cybersecurity stories that have unfolded around the war.
-
How to avoid PKI mistakes that undermine your credibility
By: CyberArk
Type: eBook
PKI management is difficult enough, but when you couple it with today’s explosive growth of machines and shortening certificate lifespans, the job gets a whole lot harder. Read this eBook to hear 8 cautionary tales around PKI gone wrong, and explore how you can modernize your PKI to avoid future problems.
-
Royal Holloway: An enhanced approach for USB security management
By: TechTarget ComputerWeekly.com
Type: Resource
USB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.
-
Data privacy under the GDPR, machine learning, and more
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.
-
CW APAC, June 2020: Trend Watch - data protection
By: TechTarget ComputerWeekly.com
Type: Ezine
Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.
-
Computer Weekly – 9 May 2017: Casting the IT skills net wider
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.
-
Executive Interview: Unleashing blockchain's potential
By: TechTarget ComputerWeekly.com
Type: eGuide
Labrys founder and CEO Lachlan Feeney offers his observations about blockchain adoption in Australia, and what his firm is doing to help organisations unleash the full potential of the technology.
-
Computer Weekly – 26 September 2023: Preparing for post-quantum cryptography
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, our latest buyer's guide assesses the challenges for cryptography in the emerging era of quantum computing. Google Cloud experts explain how the internet giant is preparing its datacentres for a world of AI. And we examine the privacy, compliance and backup issues from generative AI. Read the issue now.
-
Computer Weekly – 4 July 2023: How data is beating heart disease
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out how a new data strategy is helping the British Heart Foundation to raise money and support medical research. We examine the benefits of using AI in advanced malware detection. And we reveal why the Information Commissioner is under fire for weak responses to serious data breaches. Read the issue now.
-
Managing Android devices in the enterprise
By: TechTarget ComputerWeekly.com
Type: eBook
This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).
-
Your GDPR guide
By: TechTarget ComputerWeekly.com
Type: eGuide
Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.
-
Data quality emerges from Covid-19 more critical than ever
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.
-
Computer Weekly – 1 October 2019: The most influential women in UK technology
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology. Meet the winner, Debbie Forster, CEO of Tech Talent Charter, and find out who are this year's five rising stars. Also, our latest buyer's guide looks at the latest developments in robotic process automation. Read the issue now.
-
Targeted cyber attacks in the UK and Europe
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.
-
Jargon buster guide to GDPR
By: TechTarget ComputerWeekly.com
Type: eGuide
In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.
-
CW Europe – December 2018
By: TechTarget ComputerWeekly.com
Type: Ezine
Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
-
Computer Weekly 6 August 2019: Using tech to boost staff morale
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we look at the emerging technologies being used to improve employee experience and raise staff loyalty and motivation. The CIO of the Football Association explains how IT is changing the way the national game is administered. And we examine the growing role of AI in preventing cyber attacks. Read the issue now.
-
Computer Weekly - 1 February 2022: How Ocado pushes technological boundaries
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we talk to Ocado's CTO about how the e-commerce company pushes technological boundaries. Our latest buyer's guide looks at the importance and technical challenges of data integration. There's a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now.
-
The Investigatory Powers Act 2016 and Internet Connections Records
By: TechTarget ComputerWeekly.com
Type: Research Content
This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
-
5 types of data security
By: TechTarget ComputerWeekly.com
Type: Infographic
Because no single form of data exists, no single magic-bullet technique can secure all data. A defense-in-depth data security strategy is made up of a combination of tools, techniques and policies. This infographic gives an overview of the must-have data security technologies.
-
Cloud computing storage key management
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
-
How to use a public key and private key in digital signatures
By: TechTarget ComputerWeekly.com
Type: eGuide
Ensuring authenticity of online communications is critical to conduct business. Learn how to use a public key and private key in digital signatures to manage electronic documents.
-
Computer Weekly – 7 November 2023: How ExxonMobil is leading with data
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we talk to the leader of ExxonMobil's data organisation, about the energy giant's strategy to establish enterprise-wide principles for the use of data. As the UK's Online Safety Act comes into force, we examine the tech sector's concerns over the laws around end-to-end encryption. Read the issue now.
-
Data Protection Ascends the Business Agenda
By: TechTarget ComputerWeekly.com
Type: eGuide
This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.
-
Computer Weekly – 10 October 2023: Teeing up tech at the Ryder Cup
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we go behind the scenes at golf's Ryder Cup to see the tech firsts introduced to improve the fan experience. UK tech leaders explain why they feel 'betrayed' by the government's net-zero policy changes. Read the issue now.
-
Computer Weekly – 8 November 2022: How the US-China chip war will affect IT leaders
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, as the US ramps up semiconductor sanctions on China, we examine the ramifications across the tech sector. Cyber criminals are turning to new forms of encryption – we talk to the Dutch researchers trying to catch them. And we look at what cloud providers need to do to improve customer experience. Read the issue now.
-
Fintech & the digital customer experience
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, find out how banks such as Malaysia's RHB are keeping up in the digital age, the state of mobile payments across the APAC region, and why some bankers believe retail banking will be fully automated in just a few years.
-
Computer Weekly – 18 October 2022: How Russia hacked a former MI6 spy chief
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, Russian hackers leaked emails and documents from British government, military, and intelligence officials – we examine the implications. New EU laws will govern online safety and the use of AI, but what do they mean for organisations? And we look at the growth in checkout-free shopping. Read the issue now.
-
8 secure file transfer services for the enterprise
By: TechTarget ComputerWeekly.com
Type: eGuide
Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.
-
The exploitation of flaws in the HTTPS protocol
By: TechTarget ComputerWeekly.com
Type: Research Content
For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
-
Infographic: 12 API security best practices
By: TechTarget ComputerWeekly.com
Type: Infographic
As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.
-
Computer Weekly – 22 November 2022: Cyber criminals target World Cup Qatar 2022
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, as the FIFA World Cup opens in Qatar, we examine the cyber security threats from criminals targeting the event. We report from the Gartner Symposium on the latest predictions for enterprise software development. And we talk to the CIO of Kyiv City Council about managing IT in the shadow of war. Read the issue now.
-
CW APAC: Expert advice on zero-trust security
By: TechTarget ComputerWeekly.com
Type: Ezine
Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
-
How to unlock the true value of data
By: TechTarget ComputerWeekly.com
Type: eGuide
With a robust data architecture in place, a firm's data science team can turn raw data into business insight. We take a quick look at how this can be done.
-
A Computer Weekly buyer's guide to data protection
By: TechTarget ComputerWeekly.com
Type: eGuide
Data protection is now an unavoidable consideration in business, and the costs of not getting it right are higher than ever. In this 14-page buyer's guide, Computer Weekly looks at the larger fines coming out of the EU's GDPR, the importance of focusing on business value and the advantages of building compliance into your company's culture.
-
Infographic: Top big data trends in 2022
By: TechTarget ComputerWeekly.com
Type: Infographic
Big data is driving changes in how organizations process, store and analyze data. The benefits are spurring even more innovation. In this infographic, we take a look at four major trends in big data for 2022.
-
Infographic: Comparing data protection vs. data security vs. data privacy
By: TechTarget ComputerWeekly.com
Type: Infographic
An organization's data is one of its most valuable assets and must be protected accordingly. Because there are so many ways data can potentially be compromised, organizations must take a multifaceted approach to ensure the well-being of their data. This means focusing on three key areas: data protection, data security and data privacy.
-
Data classification tools: What they do and who makes them
By: TechTarget ComputerWeekly.com
Type: eGuide
Data classification is an essential pre-requisite to data protection, security and compliance. Firms need to know where their data is and the types of data they hold. In this article, learn more about how these tools can help keep your data tidy and which suppliers offer the best options in the market.
-
Data governance more important now than ever
By: TechTarget ComputerWeekly.com
Type: eGuide
As organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.
-
6 data preparation best practices for analytics applications
By: TechTarget ComputerWeekly.com
Type: eGuide
Amid issues of data sources, data silos and data quality, the process of collecting and prepping data for analytics applications requires a practical and effective approach. In this infographic, we put together 6 data preparation best practices for analytics applications to help enterprises master their data.
-
Fail to prepare quality data, prepare to fail
By: TechTarget ComputerWeekly.com
Type: eGuide
Fail to prepare, prepare to fail is an adage that never fails to lose its veracity. The same is true of using poor quality data, known to be the bane of the lives of data analysts, not to speak of organisations that yearn to be "data driven".
-
What's all this talk about data mesh? Everything you need to know
By: TechTarget ComputerWeekly.com
Type: eGuide
Data mesh is a new approach aims to make data more accessible, usable and valuable to the organization by creating a more flexible, scalable and collaborative data architecture. In this article, we point out some of the benefits and challenges of data mesh, and how to set up the right culture and infrastructure to make the most of this approach.
-
Drop the complexity: A refined approach to data governance
By: Alation
Type: White Paper
Data governance stratagems have become so complex over the years, meaning it’s time for businesses to reimagine their governance approaches to cut down on bloat and inefficiency. Read on to learn how Alation’s data governance methodology goes a step beyond traditional approaches to ensure quality data remains compliant and generates business value.
-
CIO Trends APAC: Developing a data-driven culture
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, read more about what organisations in Asia-Pacific are doing to sharpen their data analytics strategies to cope with business demands in a challenging economic climate.
-
CW APAC: Expert Advice on data management
By: TechTarget ComputerWeekly.com
Type: Ezine
In this handbook, Computer Weekly looks at how companies and data management experts are tackling data challenges, and finds out how organisations are augmenting data management through artificial intelligence and machine learning.
-
Computer Weekly – 12 September 2023: The dangers of breaking encryption
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we detail the concerns of IT experts about the UK's Online Safety Bill's proposals to weaken end-to-end message encryption. Our buyer's guide continues to look at the issues around integrating SaaS applications, with a particular eye to the proliferation of SaaS during the Covid pandemic. Read the issue now.