Hardware Tokens Reports

6 user authentication types to secure networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The goal of identity and access management is to ensure the right people have the right access to the right resources - and that unauthorised users can't get in. Learn about 6 authentication types and the authentication protocols available to determine which best fit your organisation's needs.
Posted: 15 Mar 2023 | Published: 16 Mar 2023

TechTarget ComputerWeekly.com

Royal Holloway: Secure multiparty computation and its application to digital asset custody
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For this article in our Royal Holloway security series, the authors provide a brief overview of multiparty computation (MPC) and highlight the benefits of MPC-based bitcoin custody over traditional approaches.
Posted: 20 Apr 2022 | Published: 20 Apr 2022

TechTarget ComputerWeekly.com

Multifactor authentication: What are the pros and cons?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
Posted: 05 Feb 2023 | Published: 06 Feb 2023

TechTarget ComputerWeekly.com

How Security Can Help Grow Your Business: The Marketing Side of Tokenization
sponsored by First Data Corporation
WHITE PAPER: Tokenization is more than a security measure and more than a cost savings technique. It can be used to build your business. This white paper discusses the ways tokens can be used in back-end business operations to develop powerful marketing programs.
Posted: 15 Aug 2011 | Published: 15 Aug 2011

First Data Corporation

April Essential Guide to Data Protection
sponsored by TechTarget Security
EGUIDE: In this Information Security Essentials Guide, gain expert insight into the increasing focus on data protection and uncover proven strategies for keeping your sensitive data secure. Explore topics including tokenization technology, 4 keys to DLP success, disaster recovery planning, and more.
Posted: 10 Apr 2012 | Published: 11 Apr 2012

TechTarget Security

Introduction to Data Loss Prevention Tools
sponsored by InteliSecure
EGUIDE: In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

Cybersecurity: The Latest Battleground for MSPs
sponsored by SkOUT
EGUIDE: Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
Posted: 03 Jul 2019 | Published: 01 Jul 2019

SkOUT

Application Development Security Requires Forethought
sponsored by tCell
EGUIDE: Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

Presentation Transcript: Address Network Security and Dramatically Reduce PCI DSS Scope with Gateway Tokenization
sponsored by Intel
PRESENTATION TRANSCRIPT: Read this presentation transcript forĀ an overview of planned changes to the PCI DSS Standard and pros and cons of available technology solutions. Find out how security gateways offer ideal solutions for handling internal tokenization when maintaining ownership and controlling PAN data are primary organizational concerns.
Posted: 19 May 2011 | Published: 19 May 2011

Intel

Your IIoT Security Plan: Risks in Manufacturing
sponsored by Bayshore Networks
EGUIDE: In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.
Posted: 02 Jun 2017 | Published: 26 May 2017

Bayshore Networks