secutiry

Results 1 - 3 of 3Sort Results By: Published Date | Title | Company Name
By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : secutiry, certificates, keys, security attacks, business
     Venafi
By: Symantec     Published Date: Oct 12, 2012
This paper discusses how online businesses can instill trust and confidence in their websites, protect valuable brands, and safeguard customers' sensitive information.
Tags : security solutions, online secutiry, ssl, secure socket layer, extended validation ssl, ev ssl, security, business technology
     Symantec
By: Black Duck Software     Published Date: May 18, 2016
Read this case study to learn how ScienceLogic employs Black Duck to: - Identify open source throughout their code base - Determine possible license violations and conflicts - Know when new threats are reported
Tags : black duck, science logic, open source, visibility, secutiry, software, security, enterprise applications, business technology
     Black Duck Software
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com