RESEARCH CONTENT:
This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
EZINE:
In this week's Computer Weekly, our latest buyer's guide assesses the challenges for cryptography in the emerging era of quantum computing. Google Cloud experts explain how the internet giant is preparing its datacentres for a world of AI. And we examine the privacy, compliance and backup issues from generative AI. Read the issue now.
WHITE PAPER:
This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
EGUIDE:
This expert e-guide describes the dangerous vulnerabilities that can arise from insecure Secure Socket Layer (SSL) usage, and details essential tips and strategies for properly implementing and configuring SSL in order to ensure Web security.
EGUIDE:
In this FAQ Guide, David Chapa, senior analyst at the Enterprise Strategy Group, discusses some best practices for tape vaulting. Find out the costs of tape vaulting services, how offsite tape storage costs are determined, how to negotiate your SLAs, and whether or not you should encrypt your tapes before you ship them offsite.
WHITE PAPER:
This survey addresses the maturity of an organization’s IT security and data protection program, how encryption is used in organizations, encryption features organizations consider most important, and much more.
WHITE PAPER:
This white paper covers the business and technology reasons behind customers' continued choice of Oracle Database for their Siebel Applications deployments.
WHITE PAPER:
Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals.
EGUIDE:
In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.