Tokens Reports

How to Effectively Manage the Cloud Logs of Security Events
sponsored by Splunk
EGUIDE: Discover the security growing pains created by the growth of cloud file sharing and collaboration services and how they are presenting new problems including "shadow cloud" and alert fatigue.
Posted: 16 May 2017 | Published: 11 May 2017

Splunk

Cybersecurity: The Latest Battleground for MSPs
sponsored by SkOUT
EGUIDE: Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
Posted: 03 Jul 2019 | Published: 01 Jul 2019

SkOUT

Application Development Security Requires Forethought
sponsored by tCell
EGUIDE: Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

Readers' Choice Awards
sponsored by Information Security Magazine
JOURNAL ARTICLE: Information Security and SearchSecurity.com presented more than 1,600 readers with some 360 security products, divided into 18 categories, three categories which failed to draw sufficient reader response are covered in market articles.
Posted: 13 Apr 2008 | Published: 01 Apr 2008

Information Security Magazine

Tokenization Buyer's Guide
sponsored by Intel
WHITE PAPER: PCI DSS expert Walter Conway demystifies tokenization by discussing use cases, comparing tokenization vs. encryption and providing various alternatives for implementing tokenization. Finally, Walter provides guidance on how to prepare for implementing tokenization and select a solution appropriate for your needs.
Posted: 12 Sep 2011 | Published: 08 Sep 2011

Intel

Beyond Passwords & Outdated Physical Access Systems
sponsored by Entrust, Inc.
WHITE PAPER: Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
Posted: 05 Sep 2012 | Published: 31 Aug 2012

Entrust, Inc.

Top Mobile Security Threats: Insight Into Threats and Attackers
sponsored by Lookout
EGUIDE: Discover how IT can tackle the top modern mobile security threats by identifying vulnerabilities, integrating successfully with the cloud, and more.
Posted: 30 Mar 2017 | Published: 28 Mar 2017

Lookout

April Essential Guide to Data Protection
sponsored by TechTarget Security
EGUIDE: In this Information Security Essentials Guide, gain expert insight into the increasing focus on data protection and uncover proven strategies for keeping your sensitive data secure. Explore topics including tokenization technology, 4 keys to DLP success, disaster recovery planning, and more.
Posted: 10 Apr 2012 | Published: 11 Apr 2012

TechTarget Security

Introduction to Data Loss Prevention Tools
sponsored by InteliSecure
EGUIDE: In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

Presentation Transcript: ISACA PCI Compliance Symposium
sponsored by Intel
PRESENTATION TRANSCRIPT: Organizations who handle credit card information must have a solid security strategy to protect their customer's sensitive data and meet the requirements of PCI DSS. Read this presentation transcript as Blake Dournaee offers insight into PCI DSS and key security practices to build and maintain a secure network through tokenization.
Posted: 19 May 2011 | Published: 19 May 2011

Intel