File Encryption Reports

Computer Weekly – 9 May 2017: Casting the IT skills net wider
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 May 2017

TechTarget ComputerWeekly.com

CW Europe – December 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
Posted: 08 Feb 2021 | Published: 13 Dec 2018

TechTarget ComputerWeekly.com

7 NAS encryption best practices to protect data
sponsored by TechTarget ComputerWeekly.com
EBOOK: NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.
Posted: 24 Mar 2022 | Published: 24 Mar 2022

TechTarget ComputerWeekly.com

How Russia's war in Ukraine is changing the cybersecurity game and why that matters
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The build-up to the attack on Ukraine by Russia saw warnings from security pros that the world was on the verge of a cyber war. So far, such attacks have been confined to the theatre of conflict, but this doesn't mean things won't change. In this e-guide, we explore some of the more impactful cybersecurity stories that have unfolded around the war.
Posted: 06 Apr 2022 | Published: 06 Apr 2022

TechTarget ComputerWeekly.com

Data Security and Privacy Concerns Pushed into the Spotlight
sponsored by GeoTrust, Inc.
EGUIDE: In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

GeoTrust, Inc.

Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
sponsored by GeoTrust, Inc.
EGUIDE: This expert e-guide describes the dangerous vulnerabilities that can arise from insecure Secure Socket Layer (SSL) usage, and details essential tips and strategies for properly implementing and configuring SSL in order to ensure Web security.
Posted: 27 Dec 2012 | Published: 19 Dec 2012

GeoTrust, Inc.

Protecting Your Website With Always On SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.
Posted: 11 Sep 2013 | Published: 01 May 2012

Symantec Corporation

GDPR Developments Will Dominate Storage and Compliance in 2017
sponsored by Arrow + NetApp
EGUIDE: In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.
Posted: 17 May 2017 | Published: 11 May 2017

Arrow + NetApp

After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®
sponsored by Lumension
WHITE PAPER: This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Lumension

Next Generation Enterprise WAN DMVPN
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper that outlines steps for migrating from DMVPN to GET VPN, and learn about what benefits you stand to gain by doing so.
Posted: 11 Jul 2012 | Published: 11 Jul 2012

Cisco Systems, Inc.