FIPS PUB 197 Reports

Computer Weekly – 4 July 2023: How data is beating heart disease
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how a new data strategy is helping the British Heart Foundation to raise money and support medical research. We examine the benefits of using AI in advanced malware detection. And we reveal why the Information Commissioner is under fire for weak responses to serious data breaches. Read the issue now.
Posted: 30 Jun 2023 | Published: 04 Jul 2023

TechTarget ComputerWeekly.com

Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

Cyber Security 2016 and beyond
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
Posted: 08 Feb 2021 | Published: 18 Apr 2016

TechTarget ComputerWeekly.com

Hacking the Human Operating System
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
Posted: 08 Feb 2021 | Published: 27 Feb 2017

TechTarget ComputerWeekly.com

Focus: Infosec17
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
Posted: 08 Feb 2021 | Published: 19 Jun 2017

TechTarget ComputerWeekly.com

Security Think Tank Pt.2 - 2020 bought us universal remote working. So what next?...
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com

Computer Weekly – 8 November 2022: How the US-China chip war will affect IT leaders
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the US ramps up semiconductor sanctions on China, we examine the ramifications across the tech sector. Cyber criminals are turning to new forms of encryption – we talk to the Dutch researchers trying to catch them. And we look at what cloud providers need to do to improve customer experience. Read the issue now.
Posted: 04 Nov 2022 | Published: 08 Nov 2022

TechTarget ComputerWeekly.com

Build Identity Verification Processes with the Power of AI
sponsored by Jumio
EGUIDE: This expert e-guide explores recent developments in AI-powered identity verification technology. Get tips on how to outsmart potential fraudsters by finding out how you can improve your identity verification practices by building machine learning and other AI-based technologies into your security strategy.
Posted: 19 Nov 2018 | Published: 15 Nov 2018

Jumio

Adapt Security for Hybrid Cloud Environments
sponsored by Citrix
EGUIDE: In this expert e-guide, find out how you can overcome the security challenges of hybrid cloud, and learn about the organizational and cultural changes that accompany this shift in security.
Posted: 23 May 2018 | Published: 18 May 2018

Citrix

Cyber-Risk Strategies and Models for a Post-Perimeter Age
sponsored by TechTarget Security
EBOOK: In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

TechTarget Security