Block Cipher White Papers

(View All Report Types)
Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

KineticD Security
sponsored by KineticD
WHITE PAPER: The purpose of this white paper is to demonstrate how KineticD meets and exceeds its clients' demands and expectations for the security of its online backup SaaS offering.
Posted: 02 Aug 2010 | Published: 02 Aug 2010

KineticD

Protecting User from Firesheep and Sidejacking Attacks with SSL
sponsored by VeriSign EMEA
WHITE PAPER: This paper addresses the problems of unsecured Wi-Fi including recent security concerns such as the Firesheep and sidejacking, and how to protect against these attacks. Learn how public websites can provide security with TLS/SSL by not only harden against many attacks, but also assure users of that security.  
Posted: 29 Jul 2011 | Published: 29 Jul 2011

VeriSign EMEA

Smart Policies for Personal-Liable Smartphones
sponsored by BlackBerry
WHITE PAPER: This white paper addresses how businesses and employees can compromise between personal and business smartphone use, as well as benefit by establishing personal-liable smartphone policies.
Posted: 05 Apr 2010 | Published: 05 Apr 2010

BlackBerry

Securing the Organization: Creating a Partnership between HR and Information Security
sponsored by ISC2
WHITE PAPER: The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization.
Posted: 14 Apr 2009 | Published: 09 Sep 2008

ISC2

The Complete Guide to Backup and Recovery for the SMB
sponsored by Nexsan
WHITE PAPER: Small and mid-sized businesses are a market that has been underserved by data protection software, appliances and online backup services until the last few years.Yet, these organizations have the same needs as large enterprises to protect their data. Full-time, dedicated IT resources are often beyond their means.
Posted: 23 Sep 2011 | Published: 23 Sep 2011

Nexsan

Continuous Cyber Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This informative paper takes an in-depth look at continuous monitoring, describing how you can successfully deploy the technology and how it can increase visibility and streamline your security management.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

Lumeta Corporation

Reducing PCI DSS Scope with the First Data® TransArmor® Solution
sponsored by First Data Corporation
WHITE PAPER: Organizations who handle payment card data are obligated to comply with the Payment Card Industry Data Security Standard (PCI DSS). This whitepaper discusses how the TransArmor® solution can enable scope reduction, minimizing costs and effort of PCI compliance.
Posted: 15 Aug 2011 | Published: 15 Aug 2011

First Data Corporation

IT Security: Built-In Protection with Intel vPro Technology
sponsored by Intel
WHITE PAPER: New security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features.
Posted: 12 Jun 2012 | Published: 01 May 2012

Intel

A Security Assessment of Android Full-disk Encryption
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016

TechTarget ComputerWeekly.com

Is Your Network Too Flat? Prevent Data Breaches with Segmentation
sponsored by TechTarget Security
EZINE: How do you determine if your network is too flat? Without proper network segmentation, attackers can easily move around the network, turning a minor problem into a major disaster. Learn about segmentation strategies that can improve your network security infrastructure in this issue of Information Security.
Posted: 02 May 2016 | Published: 02 May 2016

TechTarget Security

The Transformation of Wireless Network Security
sponsored by TechTarget Security
EBOOK: This expert guide outlines what you need to know in order to integrate Wi-Fi security into your overarching network security strategy. Read on to learn about how to effectively maintain robust security in the age of wireless connectivity.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

TechTarget Security

The Growing Need for Self-Encrypting Drives
sponsored by Micron Technology
WHITE PAPER: More data storage applications require encrypted solutions. Find out about easily integrated, low-cost data protection.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

TOPICS:  IT Management
Micron Technology

Information Security Magazine - September 2009: Readers’ Choice Awards
sponsored by Information Security Magazine
EZINE: This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.
Posted: 15 Sep 2009 | Published: 15 Sep 2009

Information Security Magazine

How to Securely Erase SSD to Keep Your Data Safe
sponsored by Micron Technology
WHITE PAPER: Proper erasing methods are key to data security. Discover options beyond overwriting data to the full disk pack.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

TOPICS:  IT Management
Micron Technology

Expert ways to maximize security in Exchange
sponsored by TechTarget Data Center
EGUIDE: This expert e-guide provides tips for maximizing Exchange security, including how to leverage the enhanced capabilities in Forefront Protection 2010. In addition, it reviews the 6 most commonly overlooked Exchange security vulnerabilities.
Posted: 02 May 2012 | Published: 02 May 2012

TechTarget Data Center

The Best Email Security Comes Through Strategy and Tactics
sponsored by TechTarget Security
EBOOK: Achieving the best email security possible should be a top InfoSec priority. Why? Attackers work day and night thinking up new ways to bypass IT security. In this security handbook, learn how to approach email security both strategically and tactically.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

TechTarget Security

Pulse E-Zine: Managing BYOD and Security
sponsored by TechTarget Health IT
EZINE: The quarterly Pulse e-zine delves into a range of issues affecting hospitals, doctors, payers, policymakers and other industry stakeholders. Explore the hottest topics that impact IT decision makers today and gain knowledge from peers through snapshots of trends, SearchHealthIT industry research and our on-location conference coverage.
Posted: 15 May 2013 | Published: 15 May 2013

TechTarget Health IT

Exchange Insider E-Zine vol. 11: Office 365, mobile devices, Exchange security
sponsored by TechTarget Security
EZINE: In this edition of the Exchange Insider E-Zine, explore how to migrate to Office 365, support mobile devices and protect your Exchange Server environment from the latest threats.
Posted: 01 Nov 2011 | Published: 01 Nov 2011

TechTarget Security

Cloud computing storage key management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
Posted: 08 Feb 2021 | Published: 04 May 2016

TechTarget ComputerWeekly.com

Data Governance Strategies for the Digital Age
sponsored by TechTarget Security
EBOOK: The digital age has forced many companies to alter - and sometimes completely revamp - data governance processes. In this handbook, learn about big data governance complications and the latest information management strategies for adapting to increased storage needs, data-specific compliance mandates and security vulnerabilities in the digital age.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

TechTarget Security

CW Europe – September Edition
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of CW Europe read how data discipline ensures you avoid data loss, as well as helping you to think clearer and to be organised.
Posted: 04 Sep 2013 | Published: 04 Sep 2013

TechTarget ComputerWeekly.com

Mobile Device Security Best Practices for BYOD
sponsored by TechTarget Security
EGUIDE: This expert E-Guide from SearchMobileComputing.com explores the issue of mobile device security and offers best practices for making a BYOD program work in your organization.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

TechTarget Security

Jargon Buster Guide to Post Quantum Cryptography
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.
Posted: 08 Feb 2021 | Published: 02 Oct 2018

TechTarget ComputerWeekly.com

Acronis vmProtect 6
sponsored by Acronis
TRIAL SOFTWARE: Built specifically for VMware vSphere™, Acronis® vmProtect™ 6 provides all the features you need in an extremely easy-to-use solution that can be deployed in minutes so you can start to perform your backup and recovery tasks.
Posted: 14 Dec 2011 | Premiered: 14 Dec 2011

Acronis

Computer Weekly – 3 March 2015: Food giant acts fast on lean IT
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the CIO from food giant Iglo – owner of Birds Eye – about how to work with outsourcers to keep IT lean and agile. We examine microservices, an important emerging trend in systems architecture. And we look into the issues around hybrid cloud storage. Read the issue now.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

TechTarget ComputerWeekly.com

eBook: Mobile Security: Protecting Mobile Devices, Data Integrity and Your Corporate Network
sponsored by TechTarget Mobile Computing
EBOOK: Structured in four in-depth chapters, this E-Book will provide an objective perspective into the key defenses against device and data loss, network compromise and mobile malware.
Posted: 09 Dec 2008 | Published: 09 Dec 2008

TechTarget Mobile Computing

Avoid Cloud Storage Headaches With A Little Bit of Homework
sponsored by TechTarget Storage
EBOOK: If you're thinking about using cloud storage, learn the questions you need to ask service providers, and which tools can be most helpful when deploying cloud technology.
Posted: 11 Jul 2014 | Published: 10 Jul 2014

TechTarget Storage

Computer Weekly – 13 November 2018: Will the $34bn IBM-Red Hat mega-merger succeed?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Nov 2018

TechTarget ComputerWeekly.com

Computer Weekly – 27 August 2013: The devices are taking over – machines set to dominate the internet as more than a trillion sensors send data over the web in the near future
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we take a look at how in a couple of years the internet will be dominated by machines and sensors, rather than people. We also look at how to protect an organisation's data assets. And how will SAP's cloud and in-memory expansion affect existing customers? Read the issue now.
Posted: 27 Aug 2013 | Published: 27 Aug 2013

TechTarget ComputerWeekly.com

Computer Weekly – 29 January 2013: The end of the PC refresh cycle?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we ask if the days of the PC refresh cycle are over, due to declining PC sales, consumer technology and virtualisation. Remote working can be a challenge – but one project manager is doing so on Mount Everest. And we kick-off our latest buyer's guide, looking at infrastructure needs for big data. Read the issue now.
Posted: 28 Jan 2013 | Published: 29 Jan 2013

TechTarget ComputerWeekly.com

2022 Unit 42 Network Threat Research Report
sponsored by Palo Alto Networks
RESEARCH CONTENT: With advanced threats crowding the cyber landscape, how can you secure your dispersed workforce? This research report by Palo Alto Networks’ Unit 42 unpacks 6 components of a strong network-security posture. Keep reading to discover those insights – and much more.
Posted: 03 May 2024 | Published: 03 May 2024

TOPICS:  .NET
Palo Alto Networks

Information Security Magazine - February 2009: BUDGET SQUEEZE - How to Maintain Security during a Recession
sponsored by Information Security Magazine
EBOOK: Check out this eBook and get expert advice that can help your company successfully improve its threat management posture.
Posted: 08 Apr 2009 | Published: 01 Feb 2009

Information Security Magazine

Network Evolution: November Issue
sponsored by TechTarget Networking
EZINE: This issue of Network Evolution, examines real SDN use cases and deployment models for mainstream enterprises. Also in this issue, network engineers weigh in on how the growing pressure to improve their fluency in security is affecting their jobs.
Posted: 02 Nov 2015 | Published: 02 Nov 2015

TechTarget Networking