RSS feed Get our RSS feed

News by Topic

authenticity

Results 1 - 12 of 12Sort Results By: Published Date | Title | Company Name
By: Venafi     Published Date: Aug 10, 2015
This whitepaper reveals why enterprises are vulnerable to trust-based attacks.
Tags : cyberattacks, security, data security, cryptographic keys, digital certificates, authenticity
     Venafi
By: DigiCert     Published Date: Jun 19, 2018
Many security-minded organizations utilize code signing to provide an additional layer of security and authenticity for their software and files. Code signing is carried out using a type of digital certificate known as a code-signing certificate. The process of code signing validates the authenticity of legitimate software by confirming that an application is from the organization who signed it. While code-signing certificates can offer more security, they can also live an unintended secret life providing cover for attack groups, such as the Suckfly APT group. In late 2015, Symantec identified suspicious activity involving a hacking tool used in a malicious way against one of our customers. Normally, this is considered a low-level alert, however, the hacktool had an unusual characteristic not typically seen with this type of file; it was signed with a valid code-signing certificate. Download this whitepaper to find out more about how you can protect your business from such threats.
Tags : 
     DigiCert
By: Tapinfluence     Published Date: Jul 20, 2016
Why the future of influencer marketing starts with people and relationships not popularity. Together, we studied the state of influencer marketing by surveying marketers and then separately polling influencers to get a balanced view. The insights were compelling. When compared, they were also revealing.
Tags : influencer marketing, content marketing, social media, marketing communications, influencers, marketers, site ambassadorships, authenticity
     Tapinfluence
By: Curalate     Published Date: Jan 10, 2017
Driving authenticity from dreaming to sharing. Download this guide from Curalate to learn more.
Tags : visual content, digital touchpoint, lifestyle content, emerging marketing, internet marketing
     Curalate
By: Monotype     Published Date: Jun 29, 2017
After years spent hidden in the shadows of Millennials, Generation Z is taking over the spotlight and making some serious waves in the process. Gen Zs are the first true digital natives, born between the late 1990’s to the mid 2000’s, and only know a world with Internet access, social media and smartphones. This “YouTube generation” is tech-savvy and pragmatic, drives innovation and the way we consume media, and they’re pushing brands and marketers to catch up in the process. Like, follow, read, repeat In an era of massive information (and advertising) overload, the brand-consumer relationship is a delicate dance. One misstep and a disgruntled customer will gladly find a new partner. Thanks to a mobile-first, visually rich, social and digital world, people expect flexibility, authenticity and consistency in every single interaction with a brand. In order to keep your customers engaged and happy, look to the emerging behaviours and preferences of Generation Z as a beacon for what’s to c
Tags : generation z, communication, media, marketing, branding, customer engagement, digital engagement
     Monotype
By: Infosys     Published Date: May 21, 2018
Good coffee is more than just a drink - it's an art. And coffee connoisseurs (distributors, retailers, and consumers) want to be sure of the authenticity of the art they buy. But given the complex supply chain and the number of stakeholders involved in getting coffee from the far to the cup, it is almost impossible to ascertain the lineage, health, and origin of your coffee.
Tags : blockchain, finance, distributors, retailers, consumers
     Infosys
By: Mimecast     Published Date: Sep 30, 2008
Today, email management is not only a filing and storage challenge. Because law firms and attorneys must be equipped to take control of litigation, email authenticity must be unquestionable with strong chains of custody, constant availability, and tamper-proof security. This white paper summarizes the author's experiences of litigating in fractured environments, particularly as they pertain to email. Learn the 12 steps that will help you gain control of your electronically stored data.
Tags : mimecast, saas, email solutions, evidence, security, email managemeng, archiving, ediscovery
     Mimecast
By: Bazaarvoice     Published Date: Nov 05, 2014
This paper explores what authenticity really means to consumers, and how brands can deliver it, every time. Includes best practices for companies that collect and display reviews, handling employee reviews, and how dubious practices can harm your business.
Tags : bazaarvoice, customer loyalty, authemticity, customer relationships, authentic users, generated content, best practices, inauthentic practices
     Bazaarvoice
By: Yello     Published Date: Mar 14, 2016
Use this guide to help you set transparent goals, create a transparent experience and adopt transparent authenticity.
Tags : yello, talent acquisition, transparent authenticity, recruiting transparency, recruitment marketing roi, data-driven performance metrics, roi
     Yello
By: Bazaarvoice     Published Date: Oct 14, 2014
This paper explores what authenticity really means to consumers, and how brands can deliver it, every time. Includes best practices for companies that collect and display reviews, handling employee reviews, and how dubious practices can harm your business.
Tags : bazaarvoice, marketing, reviews, purchase intent, brand, feedback, crm & customer care, sales
     Bazaarvoice
By: NetIQ Corporation     Published Date: Nov 18, 2006
This white paper is a must read for those involved in the process of log management for legal use. You'll examine the admissibility of log data in court cases; maintaining the authenticity of log data; and how log data can be attacked and stand up to scrutiny. And, learn legal terms like Hearsay, Best Evident Rules, etc.
Tags : log file, data protection, log management, legal log, log data, log law, authenticated log, netiq
     NetIQ Corporation
By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data
     ProofSpace
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics