RESEARCH CONTENT:
For this article in our Royal Holloway security series, the authors provide a brief overview of multiparty computation (MPC) and highlight the benefits of MPC-based bitcoin custody over traditional approaches.
EGUIDE:
Discover how IT can tackle the top modern mobile security threats by identifying vulnerabilities, integrating successfully with the cloud, and more.
EGUIDE:
Learn how to bridge the communication divide between app developers and security pros, as well as foster secure coding practices in your enterprise to mitigate the vulnerabilities in your web applications.
WEBCAST:
As we ring in 2011 around the globe, we should also stop and take a look at PCI Compliance – to see where we've been, and discuss where it's headed. Hear from an expert panel of speakers and learn about tokenization, PCI DSS, and what version 2.0 will mean for the future.
WHITE PAPER:
This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.
EGUIDE:
Access this expert e-guide to learn how the top of the line email encryption software measures up to one another. Find out what to look for when it comes to strength of cryptography, file security, mobile device support, and more.
EGUIDE:
Discover the security growing pains created by the growth of cloud file sharing and collaboration services and how they are presenting new problems including "shadow cloud" and alert fatigue.
EGUIDE:
Although strong authentication methods have gained some momentum in the past years, they haven’t become completely widespread enough to replace passwords. This expert E-Guide discusses why this is the case. Uncover the challenges and benefits of strong authentication implementation and if these methods are strong enough for compliance.
JOURNAL ARTICLE:
Information Security and SearchSecurity.com presented more than 1,600 readers with some 360 security products, divided into 18 categories, three categories which failed to draw sufficient reader response are covered in market articles.
EGUIDE:
Learn how RASP, or runtime application self-protection, could be the answer to prevent vulnerabilities from slipping through the web app review process and block new, unforeseen threats.