Data protection

ÑñûëêàÄàòàÎáúåì â êáàéòàõ×èñëî ñòðàíèöÑïðàâêà
Information Security. Handle with Care also 5 ways to influence vendor management security and disaster recovery 2011 3153 41  
Technical guide on Data Privacy 2011 171 21  
Essential Guide to Data Protection 2009 3846 43  
Anatomy of a Data Breach Why Breaches Happen and What to Do About It (Symantec) 2010 2433 15  
Nine questions Encryption Vendors don't want to Answer A buyer guide to enterprise data encryption 2009 638 11  
Kill Your Data To Protect It From Cybercriminals by John Kindervag July 12, 2012 441 15  
How to get Optimal Results with virtual Data Protection 2011 161 8  
A Holistic Approach to Dsts Protection 2009 573 15  
Data privacy best practices: time to take action! September 2008 236 20  
Essential Guide to Threat Management 2010 2808 43  
2009 Annual Study; U.K. Enterprise Encryption Trends July 2009 530 27  
Bueyer’s Guide to Antimalware 2009 402 9  
The Data Security Challenge A Layered Security Strategy for Preventing Data Leakage, Theft and Insider Abuse 2008 265 9  
The Massachusetts Data Protection Low 2009 5378 32  
Secure Data Transmission: Using a Managed File Transfer 2010 2051 6  
2008 Annual Study: Cost of a Data Breach February 2009 7457 31  
Protecting Data From the Cyber Theft Pandemic (FireEye) April, 2009 670 6  
Data loss prevention strategies, practices and tools are more important than ever. Here’s what you need to know. 2010 893 31  
Data Breach Dangers: Learn to How to Protect Data and Lower Security Spending 2009 550 7  
Essentual Guide to DATA protection 2011 1829 48  
Top-10 Guide for Protecting Sensitive Data from Malicious Insiders 2010 184 9  
Anatomy of a Data Breach Why Breaches Happen and What to Do About It 2010 2433 15  
Data Protection and Recovery for Physical and Virtual Environments August 2011 124 5  
The Next Generation of Network Data Leakege Protection 2009 153 12  
Encrypt (almost) anything. Adding a layer of protection to your data is easier than you think 2013 1030 5 By Alex Castle
2014 Year of Mega Breaches & Identity Theft Findings from the 2014 2015 4883 16 Breach Level Index
Top Ten Database Security Threats The Most Significant Risks of 2015 and How to Mitigate Them 2015 202 9 Imperva
EU data protection: Essential guide 2017 4038 30 ComputerWeekly (GDPR)
2019 Data Breach Investigations Report 2019 6705 78 Verizon
Data Protection and Digital Information Bill 2022 797 192 Bill 143-EN; GB
GB