Cryptography Standards Reports

Computer Weekly – 18 October 2022: How Russia hacked a former MI6 spy chief
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, Russian hackers leaked emails and documents from British government, military, and intelligence officials – we examine the implications. New EU laws will govern online safety and the use of AI, but what do they mean for organisations? And we look at the growth in checkout-free shopping. Read the issue now.
Posted: 17 Oct 2022 | Published: 18 Oct 2022

TechTarget ComputerWeekly.com

In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER: This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SafeNet, Inc.

Security in the Cloud: New Intel® technologies enable more secure business computing in the cloud
sponsored by Intel
WHITE PAPER: Intel has developed new technologies to help improve cloud security, and has been collaborating with leading hardware and software solution providers to enable more comprehensive and integrated solutions that can make it easier for businesses to adopt cloud computing. Continue reading to learn more.
Posted: 08 Apr 2011 | Published: 08 Apr 2011

Intel

2010 Annual Study: U.S. Enterprise Encryption Trends
sponsored by Symantec Corporation
WHITE PAPER: This survey addresses the maturity of an organization’s IT security and data protection program, how encryption is used in organizations, encryption features organizations consider most important, and much more.
Posted: 03 Dec 2010 | Published: 03 Dec 2010

Symantec Corporation

Solution Brief: SAP and Blue Coat
sponsored by BlueCoat
WHITE PAPER: Blue Coat’s WAN Optimization technology is especially well suited to improving response times and reducing bandwidth consumption for SAP users, by prioritizing SAP applications and guaranteeing performance over non-critical or recreational traffic.
Posted: 08 Apr 2011 | Published: 07 Apr 2011

BlueCoat

Technical Guide on Windows Security
sponsored by TechTarget Security
EGUIDE: SearchSecurity.com presents a comprehensive guide to Windows security. Our experts help you discover all of the security enhancements made to Windows 7, including BitLocker, AppLocker, DirectAccess and the Win7 Firewall. You’ll learn how to use these tools to help your organization better manage your Windows security efforts.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

TechTarget Security

The Pros and Cons of SSL Decryption for Enterprise Network Monitoring
sponsored by Symantec Corporation
EGUIDE: SearchSecurity.com expert on network security, Brad Casey discusses the pros and cons of SSL decryption to determine its viability as an enterprise network monitoring aid. Read the e-guide and hear his opinion on how to use SSL decryption as an enterprise security tactic.
Posted: 17 Oct 2013 | Published: 17 Oct 2013

Symantec Corporation

Encryption Hiding Malware in Half of Cyber Attacks
sponsored by A10 Networks
EGUIDE: A Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

A10 Networks

What to Include in an SD-WAN Security Checklist
sponsored by Citrix
EGUIDE: SD-WAN can improve security in many ways. Simply migrating to a viable SD-WAN offering can bring benefits. But SD-WAN also provides security features to protect the traffic it manages, as well as features that protect the offering itself. Read this expert e-guide to uncover 4 different areas where enterprises should consider SD-WAN and security.
Posted: 10 Aug 2020 | Published: 30 Apr 2020

Citrix

Mobile: The Technology Game-Changer in 2013
sponsored by TechTarget Security
EGUIDE: TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

TechTarget Security