Data Encription Reports

Computer Weekly – 26 September 2023: Preparing for post-quantum cryptography
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide assesses the challenges for cryptography in the emerging era of quantum computing. Google Cloud experts explain how the internet giant is preparing its datacentres for a world of AI. And we examine the privacy, compliance and backup issues from generative AI. Read the issue now.
Posted: 22 Sep 2023 | Published: 26 Sep 2023

TechTarget ComputerWeekly.com

Computer Weekly – 22 November 2022: Cyber criminals target World Cup Qatar 2022
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the FIFA World Cup opens in Qatar, we examine the cyber security threats from criminals targeting the event. We report from the Gartner Symposium on the latest predictions for enterprise software development. And we talk to the CIO of Kyiv City Council about managing IT in the shadow of war. Read the issue now.
Posted: 18 Nov 2022 | Published: 22 Nov 2022

TechTarget ComputerWeekly.com

CW APAC: Expert advice on zero-trust security
sponsored by TechTarget ComputerWeekly.com
EZINE: Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
Posted: 08 Feb 2021 | Published: 19 Nov 2020

TechTarget ComputerWeekly.com

Computer Weekly – 2 May 2017: How to deal with data under GDPR
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.
Posted: 08 Feb 2021 | Published: 02 May 2017

TechTarget ComputerWeekly.com

2 types of endpoint encryption to protect data
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.
Posted: 04 May 2022 | Published: 04 May 2022

TechTarget ComputerWeekly.com

eGuide: Expert Tips for Deploying Secure Messaging Technologies
sponsored by TechTarget Security
WHITE PAPER: This eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.
Posted: 24 Oct 2008 | Published: 22 Oct 2008

TechTarget Security

The Massachusetts Data Protection Law
sponsored by TechTarget Security
EBOOK: Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.
Posted: 18 Jun 2009 | Published: 18 Jun 2009

TechTarget Security

Defining Your Corporate Mobile Policies
sponsored by TechTarget Security
EGUIDE: It's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization
Posted: 22 Sep 2008 | Published: 18 Sep 2008

TechTarget Security

Lessons Learned: Top Reasons for PCI Audit Failure and How to Avoid Them
sponsored by VeriSign, Inc
WHITE PAPER: The drive to protect credit card data is vital, but many companies have yet to implement technologies and processes needed to address Payment Card Industry (PCI) compliance. This white paper examines top reasons for PCI failure and how to avoid them.
Posted: 21 Nov 2006 | Published: 01 Jul 2006

VeriSign, Inc

Ensure Data Protection with Sun StorageTek T10000B Tape Drives
sponsored by Sun StorageTek
VIDEOCAST: Learn how Sun StorageTek T-series tape drives use a Crypto-Key Management System to encrypt data, and how Volsafe technology helps your business meet electronic, regulatory, and legal requirements.
Posted: 24 Oct 2008 | Premiered: Oct 23, 2008

Sun StorageTek