EGUIDE:
In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
RESEARCH CONTENT:
For this article in our Royal Holloway security series, the authors provide a brief overview of multiparty computation (MPC) and highlight the benefits of MPC-based bitcoin custody over traditional approaches.
EGUIDE:
In this era of nonstop security threats, incident response tools that help automate detection and reaction are now essential. In this expert e-guide, learn how to update your IR process.
WHITE PAPER:
A surprisingly simple service-based approach makes implementing end-to-end encryption and tokenization in your payment environment simpler than you might think. In this white paper, learn about the 4 potential activities for a merchant to do in order to add the benefit of these technologies in a service-based scenario.
WHITE PAPER:
Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
EGUIDE:
Although strong authentication methods have gained some momentum in the past years, they haven’t become completely widespread enough to replace passwords. This expert E-Guide discusses why this is the case. Uncover the challenges and benefits of strong authentication implementation and if these methods are strong enough for compliance.
WHITE PAPER:
This White Paper discusses how Intel SOA Expressway security gateway-generated tokens can replace card numbers with surrogates, removing systems from scope.
EGUIDE:
Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
WHITE PAPER:
This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.
EGUIDE:
Inside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.