RSS feed Get our RSS feed

News by Topic

enterprise information assurance

Results 1 - 3 of 3Sort Results By: Published Date | Title | Company Name
By: Entrust Datacard     Published Date: Jul 21, 2014
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions and overall trust erodes.
Tags : defending, enterprise, data security, protection, private identity, information transactions, trust, authentication
     Entrust Datacard
By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions and overall trust erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats both in sophistication and sheer frequency all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices with emphasis on strong authentication, identity assurance, mobile enablement and general layered security that can help protect against targeted attacks now and over the long term.
Tags : entrust, server, risk, assessment, authentication, standards, layered, authentication
     Entrust Datacard
By: Qualys     Published Date: Jan 08, 2015
The Critical Security Controls (CSCs), a well-known roadmap for enterprise information assurance published and maintained by the Council on CyberSecurity, is being widely adopted across financial and government sectors, according to the second SANS survey on CSC adoption. Download this report from SANS to find out why more and more organizations of various types consider the CSCs a reliable mechanism to reduce attack surfaces, increase visibility and improve protection and response.
Tags : critical security controls, csc adoption, enterprise information assurance, cybersecurity, security
     Qualys
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics