EZINE:
Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
INFOGRAPHIC:
Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.
EGUIDE:
This expert e-guide presents five essential best practices for securing employee-liable mobile devices and tablets that will allow you to safely embrace the trend toward using personal devices for business.
EGUIDE:
Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.
WHITE PAPER:
In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
EBOOK:
This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
EGUIDE:
This E-Guide explores some of the basic steps to ensure a successful migration, as well as the features you'll want to take advantage of right away and 3 key tips for making the process smoother. Uncover some of the less popular - but no less important - changes to the latest version of SQL Server.
EGUIDE:
In this FAQ Guide, David Chapa, senior analyst at the Enterprise Strategy Group, discusses some best practices for tape vaulting. Find out the costs of tape vaulting services, how offsite tape storage costs are determined, how to negotiate your SLAs, and whether or not you should encrypt your tapes before you ship them offsite.
WEBCAST:
Oracle customers, TransUnion, CMC Markets, Diamond Resorts International and National Marrow Donor Program, discuss defense-in-depth database security with data encryption, privileged user access control, data masking, and consolidated auditing and reporting.