Searched for: "essential security policies"
- Security (160)
- Cxo (12)
- Mobility (8)
- Networking (8)
- Collaboration (7)
- Developer (4)
- Microsoft (4)
- Software (4)
- Data Centers (3)
- Project Management (3)
- After Hours (2)
- Cloud (2)
- Data Management (2)
- Social Enterprise (2)
- Apple (1)
- Banking (1)
- Big Data (1)
- Google (1)
- Smbs (1)
- Start-Ups (1)
- Tech & Work (1)
About 229 results for "essential security policies"
By simulating software security crises, your organisation can rehearse how to react in the event of an actual attack. These fire drills should lead to faster, more effective respon...
Learn how the battle over privacy technologies could define the future of the web. This TechRepublic cover story explains the strange history and the serious consequences of the fi...
According to Damballa, too-few security professionals sort through too-many alerts, most of which are false alarms. Is there an answer?
A Survey on Hierarchical Attribute Set Based Encryption (HASBE) Access Control Model for Cloud Computing
Cloud computing refers to the application and service that run on a distributed system using virtualized resources and access by common internet protocol and networking standard. C...
Merchants, large and small, face the high risk of data breaches arising from inadequate security controls that leak or allow access to sensitive cardholder data. The Payment Card I...
In the wake of the Sony Pictures hack, many in IT are suggesting that trends to "liberalize" access to external technologies is partially to blame. Should IT go back to being the "...
Hash Based Approach for Providing Privacy and Integrity in Cloud Data Storage Using Digital Signatures
Cloud computing offers a prominent service for data storage and it refers to a broad set of technologies, policies and controls deployed to provide security for data and applicatio...
A Survey On: Privacy Ensuring Optimization Protocol for Cross-Domain Firewalls to Improve the Network Performance
Firewalls have become the most essential part that is deployed on the Internet for protecting the private networks. Optimizing firewall rules is very critical for enhancing the per...
Cloud&Heat offers a unique ecological solution to heat the homes of customers by placing cloud servers into private residences and harvesting the heat generated to warm the air and...
Increasing visibility into Cyber Risk and understanding its potential impact should be an essential element of an organisation’s strategy. Eliminating this risk is impossible and i...