A Security Assessment of Android Full-disk Encryption
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016
|
|
|
Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos
WHITE PAPER:
This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008
|
|
|
The Massachusetts Data Protection Law
sponsored by TechTarget Security
EBOOK:
Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.
Posted: 18 Jun 2009 | Published: 18 Jun 2009
|
|
|
How to use a public key and private key in digital signatures
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Ensuring authenticity of online communications is critical to conduct business. Learn how to use a public key and private key in digital signatures to manage electronic documents.
Posted: 04 Jul 2023 | Published: 04 Jul 2023
|
|
|
CW ANZ: Trend Watch – Security
sponsored by TechTarget ComputerWeekly.com
EZINE:
With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.
Posted: 08 Feb 2021 | Published: 18 Jul 2019
|
|
|
Application security: More important than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
Posted: 08 Feb 2021 | Published: 11 Jun 2018
|
|
|
Focus: Cyber security in the Nordics
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
With the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.
Posted: 08 Feb 2021 | Published: 31 Jul 2017
|
|
|
Computer Weekly – 23 May 2023: How to secure your software supply chain
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, our latest buyer's guide looks at secure coding and examines the challenges of securing your software supply chain. Cyber law enforcement leaders are calling on firms to end the secrecy around ransomware attacks. And we find out how facial recognition technology is being adopted by retailers. Read the issue now.
Posted: 19 May 2023 | Published: 23 May 2023
|
|
|
Automated Compliance: Making the Case and Reaping the Rewards
sponsored by Tripwire, Inc.
PODCAST:
Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.
Posted: 30 Mar 2009 | Premiered: Mar 30, 2009
|
|
|
7 NAS encryption best practices to protect data
sponsored by TechTarget ComputerWeekly.com
EBOOK:
NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.
Posted: 24 Mar 2022 | Published: 24 Mar 2022
|
|
|
Jargon Buster Guide to Post Quantum Cryptography
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.
Posted: 08 Feb 2021 | Published: 02 Oct 2018
|
|
|
2 types of endpoint encryption to protect data
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.
Posted: 04 May 2022 | Published: 04 May 2022
|
|
|
Computer Weekly – 30 January 2024: Tech companies warn EU over encryption plans
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, tech companies are calling on the European Commission to rethink plans to weaken internet encryption – we explore the issues. We talk to credit rating agency Moody's about why it thinks now is the time to invest in quantum computing. Read the issue now.
Posted: 29 Jan 2024 | Published: 30 Jan 2024
|
|
|
Computer Weekly – 25 August 2020: When algorithms don't play fair
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we report on the auditing of algorithms to countervail bias. We examine what CISOs can learn from Covid-19. And we assess how competent AI is at building applications that deliver the best possible customer experience, in our buyer's guide to modern software development. Read the issue now.
Posted: 08 Feb 2021 | Published: 25 Aug 2020
|
|
|
The ultimate guide to data preparation
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Poor data equates to wrong decisions, bias in the AI algorithm and flawed decision-making. What's more, data that personally identifies an individual can only be used in very specific ways, as stipulated by GDPR. Read about data preparation in this e-guide.
Posted: 08 Feb 2021 | Published: 22 Oct 2019
|
|
|
Computing exams, AI, water and datacentres – Computer Weekly Downtime Upload podcast
sponsored by TechTarget ComputerWeekly.com
AUDIO FILE:
In this episode of the Computer Weekly Downtime Upload podcast, Clare McDonald, Brian McKenna and Caroline Donnelly discuss the 2021 A-level and GCSE computing results, what algorithms are and are not good for, and the water consumption habits of datacentres, and their environmental impact.
Posted: 19 Aug 2021 | Published: 19 Aug 2021
|
|
|
Classifying Domain Generation Algorithm (DGA) Domains With Machine Learning
sponsored by Sealing Technologies
WHITE PAPER:
Domain generation algorithms (DGAs) can help threat actors evade detection by constantly moving between random domain names. So, how can your organization defend against that technique? Dig into this white paper to discover how SealingTech built a neural network model that detects malicious domains with 97% accuracy.
Posted: 25 Sep 2024 | Published: 30 Sep 2024
|
|
|
Achieve Quantum Resistance with Utimaco
sponsored by Utimaco
PRODUCT OVERVIEW:
Utimaco's u.trust General Purpose HSM Se-Series offers quantum-resistant cryptography to secure your infrastructure. Upgrade with Quantum Protect firmware that includes NIST-recommended post-quantum algorithms. Evaluate performance with the free PQC simulator. Read the full product overview to prepare for the quantum future.
Posted: 21 Jun 2024 | Published: 21 Jun 2024
|
|
|
Zscaler ThreatLabz State of Encrypted Attacks Report
sponsored by Zscaler
RESEARCH CONTENT:
Encrypted attacks grew 24.3% year-over-year, with malware, ad spyware sites, and phishing making up 99% of threats. Education and government saw the largest increases. Learn how to defend against these evolving encrypted threats in the Zscaler ThreatLabz State of Encrypted Attacks Report.
Posted: 13 Aug 2024 | Published: 13 Aug 2024
|
|
|
Is FDE Enough to Thwart "Evil Maid" Attacks?
sponsored by Dimension Data
EGUIDE:
In this e-guide learn why the traditionally accepted full disk encryption (FDE) isn't enough to protect enterprise data in case an attacker steals your device.
Posted: 08 Feb 2021 | Published: 21 Sep 2016
|
|
|
The Evolution of Digital Business Dictates a Modern Crypto Landscape
sponsored by DigiCert
WHITE PAPER:
Download IDC’s report, written by IDC Director Jennifer Glenn, to uncover how changes to the business landscape demand equal changes to encryption, how to achieve crypto-agility, the challenges of attaining crypto-agility, and how DigiCert Trust Lifecycle Manager addresses these needs.
Posted: 29 Oct 2024 | Published: 01 Nov 2024
|
|
|
Computer Weekly – 28 May 2019: Technology at heart of Spurs' new stadium
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, the IT chief at Tottenham Hotspurs FC discusses the tech behind the most technologically advanced football stadium in the world. We also investigate how the data powering artificial intelligence is leading to discriminatory algorithms and explore the inherent risks in 5G mobile networks. Read the issue now.
Posted: 08 Feb 2021 | Published: 24 May 2019
|
|
|
Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.
Posted: 02 Dec 2022 | Published: 06 Dec 2022
|
|
|
Data protection rises up business agenda
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.
Posted: 08 Feb 2021 | Published: 17 Dec 2018
|
|
|
Machine Learning & Bias Concerns Weigh on Data Scientists
sponsored by TechTarget
RESOURCE:
How can you address, correct, neutralize, and eliminate machine learning bias in your business? Tell us about your current analytics, BI, and/or AI/ML initiatives, and as a thank you, we'll give you a downloadable copy of our expert guide to conquering algorithmic & human bias in ML—so you can create an immediate action plan for your company.
Posted: 25 Mar 2021 | Published: 25 Mar 2021
|
|
|
Royal Holloway: A novel approach to clustering malware behaviour to improve malware detection
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Clustering malware behaviour can be very useful, but it is unknown how accurate clustering algorithms are when dealing with malware
Posted: 08 Feb 2021 | Published: 08 Jul 2020
|
|
|
Computer Weekly – 7 June 2022: Using technology to reinvent shopping
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, after the pandemic led to a boom in e-commerce, we look at how retailers are turning to tech to revitalise their stores. We examine the issues around using algorithmic automation to manage employees. And we find out how data science is supporting drug discovery at Novartis. Read the issue now.
Posted: 01 Jun 2022 | Published: 07 Jun 2022
|
|
|
AI proves value in HR, but handle with care
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, discover how the allocation of work by algorithm might have advantages for workers as well as employers, how AI is proving its value for HR and how data analytics is being used to support expansion and development.
Posted: 08 Feb 2021 | Published: 04 Jun 2019
|
|
|
Six Ways To Cure Email Encryption Headaches in Microsoft 365
sponsored by Mailprotector
EBOOK:
As organizations increasingly rely on Microsoft 365 for email communications, ensuring that sensitive data remains protected has never been more critical. Yet, while Microsoft 365 offers three types of email encryption, many MSPs struggle with gaps, complexity, and challenges that could expose their clients to risk.
Posted: 11 Oct 2024 | Published: 11 Oct 2024
|
|
|
Business Analytics: how AI is augmenting analysis, and bolstering data literacy shortfalls
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Artificial Intelligence and human analysis have been coming together in recent years. Whether using packaged BI and data preparation tools, or languages like Python and R, business analysts and data scientists and engineers alike have been exploring the use of machine learning algorithms to augment their data analyses. Read more in this e-guide.
Posted: 08 Feb 2021 | Published: 11 May 2020
|
|
|
Computer Weekly – 2 May 2017: How to deal with data under GDPR
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.
Posted: 08 Feb 2021 | Published: 02 May 2017
|
|
|
Gigamon taps eBPF to inspect encrypted traffic with Precryption technology
sponsored by Gigamon
ANALYST REPORT:
Network traffic monitoring faces challenges with encrypted traffic and hybrid cloud environments. Gigamon's Precryption technology leverages eBPF to inspect encrypted traffic before or after encryption, providing visibility without decryption. Read the full analyst report to learn more about this innovative approach.
Posted: 09 Jul 2024 | Published: 10 Jul 2024
|
|
|
Artificial Intelligence: Spotlight on ASEAN
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, read about ASEAN's efforts in harnessing AI, the challenges ahead, as well as the rapid developments in the burgeoning field.
Posted: 08 Feb 2021 | Published: 27 Aug 2018
|
|