USB Security Tokens Reports

SIEM, SOAR or both? Our security experts weigh in
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 08 Feb 2021 | Published: 21 Dec 2020

TechTarget ComputerWeekly.com

Identity trends for 2023
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Identity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.
Posted: 01 Mar 2023 | Published: 02 Mar 2023

TechTarget ComputerWeekly.com

Multifactor authentication: What are the pros and cons?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
Posted: 05 Feb 2023 | Published: 06 Feb 2023

TechTarget ComputerWeekly.com

Presentation Transcript: Address Network Security and Dramatically Reduce PCI DSS Scope with Gateway Tokenization
sponsored by Intel
PRESENTATION TRANSCRIPT: Read this presentation transcript for an overview of planned changes to the PCI DSS Standard and pros and cons of available technology solutions. Find out how security gateways offer ideal solutions for handling internal tokenization when maintaining ownership and controlling PAN data are primary organizational concerns.
Posted: 19 May 2011 | Published: 19 May 2011

Intel

Readers' Choice Awards
sponsored by Information Security Magazine
JOURNAL ARTICLE: Information Security and SearchSecurity.com presented more than 1,600 readers with some 360 security products, divided into 18 categories, three categories which failed to draw sufficient reader response are covered in market articles.
Posted: 13 Apr 2008 | Published: 01 Apr 2008

Information Security Magazine

Tokenization Buyer's Guide
sponsored by Intel
WHITE PAPER: PCI DSS expert Walter Conway demystifies tokenization by discussing use cases, comparing tokenization vs. encryption and providing various alternatives for implementing tokenization. Finally, Walter provides guidance on how to prepare for implementing tokenization and select a solution appropriate for your needs.
Posted: 12 Sep 2011 | Published: 08 Sep 2011

Intel

Incident Response Tools Can Help Automate Your Security
sponsored by ModoModo
WHITE PAPER: A major security incident happening isn't a matter of "if", it's simply a matter of "when" for the modern business. This expert e-guide will lead you through the pillars of a solid incident response plan, how to automate your policy with incident response tools, and more.
Posted: 05 Apr 2017 | Published: 30 Mar 2017

ModoModo

Computer Weekly – 2 April 2013: The benefits of context-aware security
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at context-aware security – a next generation technology that promises to improve corporate information security. As banks implement more short-term fixes to cope with new regulations, we assess the IT implications. And we examine the benefits of executive coaching for CIOs. Read the issue now.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

TechTarget ComputerWeekly.com

Six Criteria for Buying Data Loss Prevention Products
sponsored by InteliSecure
EGUIDE: Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

How Security Can Help Grow Your Business: The Marketing Side of Tokenization
sponsored by First Data Corporation
WHITE PAPER: Tokenization is more than a security measure and more than a cost savings technique. It can be used to build your business. This white paper discusses the ways tokens can be used in back-end business operations to develop powerful marketing programs.
Posted: 15 Aug 2011 | Published: 15 Aug 2011

First Data Corporation