Postings
1501 publications found:
Ulf Mattson Protegrity Corporation: How to Protect Private Data from the Database Administrator (short version)  
(2013-04-15)Ulf Mattsson, Protegrity Corporation: Encryption keys should be protected in memory, on disk and during transport between processes (short version)  
(2013-04-15)Ulf Mattsson, Protegrity Corporation: Look before selecting a database encryption solution (short version)  
(2013-04-15)How to encrypt credit cards and other information in SAP R/3 for PCI compliance (short version)  
(2013-04-15)How to implement encryption of Social Security numbers in PeopleSoft (short version)  
(2013-04-15)Encrypting columns, rows, indexes and disk in DB2 for z/OS (short version)  
(2013-04-15)Secure Encryption key lifecycle management (short version)  
(2013-04-15)How can I securely encrypt short data blocks like credit card numbers? (short version)  
(2013-04-15)PCI DSS will allow you to use cryptography, truncation, hash functions or index tokens for compliance (short version)  
(2013-04-15)Ulf Mattsson, Protegrity Corporation: Limit attackers from damaging a file system (short version)  
(2013-04-15)How to minimize the decryption overhead when searching on encrypted short database fields (short version)  
(2013-04-15)Securing Data beyond PCI in a SOA environment: Best Practices for Advanced Data Protection (short version)  
(2013-04-15)A case study - Selecting an Application Security Assurance Approach (short version)  
(2013-04-15)Protegrity Patents  
(2013-04-15)US Patent Office  
(2013-04-15)Securing Data Beyond PCI in a SOA Environment - Best Practices for Advanced Data Protection  
(2013-04-15)A Case Study - Selecting a Code Review Approach  
(2013-04-15)Protecting Web Based Applications - A Best Practices Guide  
(2013-04-15)Protegrity blog  
(2013-04-15)Enterprise Application Security - How to Balance the Use of Code Reviews and Web Application Firewalls for PCI 6.6 Compliance  
(2013-04-15)Enterprise Application Security - How to Balance the Use of Code Reviews and Web Application Firewalls for PCI Compliance  
(2013-04-15)Encrypting Data in DB2  
(2013-04-15)The PCI Knowledge Base - information about PCI from an independent community of merchants, assessors, banks, payment processors, consultants and vendors of payment systems and security technology  
(2013-04-15)How to Prevent Internal and External Attacks on Data - Securing the Enterprise Data Flow Against Advanced Attacks  
(2013-04-15)Solutions for the Enterprise - DB2 Compliance to Security Mandates and Industry Initiatives  
(2013-04-15)Page
< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 5657 58 59 60 61 >