Data protection
Ññûëêà
Äàòà
Îáúåì â êáàéòàõ
×èñëî ñòðàíèö
Ñïðàâêà
Information Security.
Handle with Care also 5 ways to influence vendor management security and disaster recovery
2011
3153
41
Technical guide on Data Privacy
2011
171
21
Essential Guide to Data Protection
2009
3846
43
Anatomy of a Data Breach Why Breaches Happen and What to Do About It
(Symantec)
2010
2433
15
Nine questions Encryption Vendors don't want to Answer
A buyer guide to enterprise data encryption
2009
638
11
Kill Your Data To Protect It From Cybercriminals
by John Kindervag
July 12, 2012
441
15
How to get Optimal Results with virtual Data Protection
2011
161
8
A Holistic Approach to Dsts Protection
2009
573
15
Data privacy best practices: time to take action!
September 2008
236
20
Essential Guide to Threat Management
2010
2808
43
2009 Annual Study; U.K. Enterprise Encryption Trends
July 2009
530
27
Bueyer’s Guide to Antimalware
2009
402
9
The Data Security Challenge
A Layered Security Strategy for Preventing Data Leakage, Theft and Insider Abuse
2008
265
9
The Massachusetts Data Protection Low
2009
5378
32
Secure Data Transmission: Using a Managed File Transfer
2010
2051
6
2008 Annual Study: Cost of a Data Breach
February 2009
7457
31
Protecting Data From the Cyber Theft Pandemic
(FireEye)
April, 2009
670
6
Data loss prevention strategies, practices and tools are more important than ever
. Here’s what you need to know.
2010
893
31
Data Breach Dangers: Learn to How to Protect Data and Lower Security Spending
2009
550
7
Essentual Guide to DATA protection
2011
1829
48
Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
2010
184
9
Anatomy of a Data Breach Why Breaches Happen and What to Do About It
2010
2433
15
Data Protection and Recovery for Physical and Virtual Environments
August 2011
124
5
The Next Generation of Network Data Leakege Protection
2009
153
12
Encrypt (almost) anything
.
Adding a layer of protection to your data is easier than you think
2013
1030
5
By Alex Castle
2014 Year of Mega Breaches & Identity Theft
Findings from the 2014
2015
4883
16
Breach Level Index
Top Ten Database Security Threats
The Most Significant Risks of 2015 and How to Mitigate Them
2015
202
9
Imperva
EU data protection: Essential guide
2017
4038
30
ComputerWeekly (GDPR)
2019 Data Breach Investigations Report
2019
6705
78
Verizon
Data Protection and Digital Information Bill
2022
797
192
Bill 143-EN; GB
GB