Postings
64 publications found:
A Practical Implementation of a Real-time Intrusion Prevention System for Commercial Enterprise Databases  
(2013-04-15)Database Security for Cloud and Outsourced Environments  
(2013-04-15)How to Secure Data in the Cloud and Beyond  
(2013-04-15)“5 questions to ask when reevaluating your data security solution” appear on page 70  
(2013-04-15)Is there a silver bullet to the payment industry's data security woes?  
(2013-04-15)Developing, Deploying and Managing a Risk-Adjusted Data Security Plan  
(2013-04-15)Doing More With Less: A Risk-Based, Cost-Effective Approach to Holistic Security  
(2013-04-15)Now, Later, Never? Analyzing the Security, Compliance and Cost Benefits of Tokenization  
(2013-04-15)A Realistic, Cost-Effective Approach for Securing Data Throughout Its Lifecycle  
(2013-04-15)Format Controlling Encryption (FCE): Standards, Security And PCI Compliance  
(2013-04-15)ISSA Presentation: PCI and Beyond - A Cost Effective Approach to Data Protection.  
(2013-04-15)ISACA Article: How to Develop, Deploy and Manage a Risk-Adjusted Data Security Plan  
(2013-04-15)Securosis about ‘Format and Datatype Preserving Encryption’ and FPE  
(2013-04-15)FORMAT-CONTROLLING ENCRYPTION USING DATATYPE-PRESERVING ENCRYPTION  
(2013-04-15)Ulf Mattsson: Now, Later, Never? Analyzing the Security, Compliance and Cost Benefits of Tokenization  
(2013-04-15)Managing Risk - A Realistic, Cost-Effective Approach for Securing Data throughout Its Lifecycle  
(2013-04-15)Doing More With Less: A Risk-Based, Cost-Effective Approach to Holistic Security  
(2013-04-15)How to implement encryption of Social Security numbers in PeopleSoft (short version)  
(2013-04-15)How can I securely encrypt short data blocks like credit card numbers? (short version)  
(2013-04-15)Ulf Mattsson, Protegrity Corporation: Limit attackers from damaging a file system (short version)  
(2013-04-15)Securing Data beyond PCI in a SOA environment: Best Practices for Advanced Data Protection (short version)  
(2013-04-15)A case study - Selecting an Application Security Assurance Approach (short version)  
(2013-04-15)Securing Data Beyond PCI in a SOA Environment - Best Practices for Advanced Data Protection  
(2013-04-15)A Case Study - Selecting a Code Review Approach  
(2013-04-15)Protecting Web Based Applications - A Best Practices Guide  
(2013-04-15)Page
< 12 3 >