EZINE:
In this week's Computer Weekly, as the FIFA World Cup opens in Qatar, we examine the cyber security threats from criminals targeting the event. We report from the Gartner Symposium on the latest predictions for enterprise software development. And we talk to the CIO of Kyiv City Council about managing IT in the shadow of war. Read the issue now.
RESEARCH CONTENT:
This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
INFOGRAPHIC:
Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.
ESSENTIAL GUIDE:
This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.
EGUIDE:
Encrypting enterprise laptops and other increasingly popular mobile devices is now common practice for users who store or interact with sensitive data. This expert e-guide takes an in-depth look at various data encryption methods and best practices for securing today’s emerging endpoints.
WHITE PAPER:
Cloud storage reduces the cost of storing less critical files, automating business processes and providing ubiquitous access to employees globally. The deployable Mezeo Cloud Storage Platform is an enterprise-class solution ideal for organizations looking to implement private clouds.
WHITE PAPER:
A surprisingly simple service-based approach makes implementing end-to-end encryption and tokenization in your payment environment simpler than you might think. In this white paper, learn about the 4 potential activities for a merchant to do in order to add the benefit of these technologies in a service-based scenario.
WHITE PAPER:
With the cloud’s dynamic nature, IT professionals are often wary about how effective data security is in this type of environment. This white paper outlines the top 10 considerations to keep in mind when managing security in the cloud to ensure your business is protected.
EGUIDE:
This SearchStorage.com E-Guide discusses the importance of protecting not just data but "use" of the associated information system, and outlines 4 capabilities needed for a better approach to data protection. Read on to learn more.