EZINE:
Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
RESEARCH CONTENT:
This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
EBOOK:
This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).
EGUIDE:
In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.
WHITE PAPER:
This survey addresses the maturity of an organization’s IT security and data protection program, how encryption is used in organizations, encryption features organizations consider most important, and much more.
EGUIDE:
This expert e-guide makes the case for data deduplication technology and outlines how it works, its advantages, different dedupe misconceptions and how it factors into disaster recovery strategies. Read on to learn more.
DATA SHEET:
To cope with growing data protection challenges, organizations are turning to cloud-based data protection for relief. Organizations are discovering that the sooner cloud-based data protection appears in their processes, the greater the benefits.
EBOOK:
Use this handbook to explore how cloud backup can help you better secure your information against ransomware, 5 critical questions to ask a cloud vendor before adopting, and the benefits merging your backup and disaster recovery services provides.
WHITE PAPER:
Access this white paper that outlines steps for migrating from DMVPN to GET VPN, and learn about what benefits you stand to gain by doing so.