Search

Your search keyword '"data security"' showing total 39,783 results

Search Constraints

Start Over You searched for: Descriptor "data security" Remove constraint Descriptor: "data security" Topic cyberterrorism Remove constraint Topic: cyberterrorism
39,783 results on '"data security"'

Search Results

1. Securing IoT healthcare platform with lightweight encryption.

2. Evaluating applied security controls for safeguarding medical device‐integrated electronic medical records.

3. West African online learning spaces security status and students' cybersecurity awareness level during COVID-19 lockdown.

4. PRO AV & CYBERSECURITY: NO COMPLACENCY AS FULL SCOPE OF ATTACKS INCREASES: From software vulnerabilities affecting APIs to massive state-sponsored cyberattacks, it's not hard to understand why professional environments across the board are placing a greater emphasis than ever on cybersecurity

5. CYBERSECURITY TO THE FOREFRONT: How pension plan sponsors are using the latest technology and detection systems to stay ahead of evolving digital threats

7. Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher.

8. ПРОБЛЕМА ЗАХИСТУ ПЕРСОНАЛЬНИХ ДАНИХ В КІБЕРПРОСТОРІ

9. How to Hit the Moving Target of Medical Device Cybersecurity: Metaphoric archers may also be challenged to extend their skills when it comes to predicate comparisons for cyber devices

10. The Cost of Cybersecurity in Medtech: Who will ultimately pay for the cybersecurity requirements that loom over the industry?

11. How AI is becoming a powerful tool for offensive cybersecurity practitioners

12. Governments fear election interference, but it’s an enterprise cybersecurity problem too

14. Download the Emerging Cybersecurity Issues Enterprise Spotlight

15. Carrier Global takes collaborative approach to cybersecurity

16. Avis reports data breach affecting 300,000 customers

17. ANZ CIOs see cybersecurity as top priority for 2025

19. Why Your Business Needs Email Encryption Now

20. Cybersecurity should return to reality and ditch the hype

21. Why OT cybersecurity should be every CISO’s concern

22. 6 hot cybersecurity trends — and 2 going cold

23. 5 recommendations for acing the SEC cybersecurity rules

24. DIGITAL TECHNOLOGIES IN THE FINANCIAL SECTOR OF THE ECONOMY.

25. Intelligent Threat Detection—AI-Driven Analysis of Honeypot Data to Counter Cyber Threats.

26. Machine Learning in Cybersecurity: Advanced Detection and Classification Techniques for Network Traffic Environments.

27. Perancangan Dasbor yang Secure Scalable dan Reusable dengan Microservices Case Study Di PT. XYZ.

28. An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure.

29. Facilitating the Integrative Use of Security Knowledge Bases within a Modelling Environment.

30. Secure File Operations: Using Advanced Encryption Standard for Strong Data Protection.

31. Six reasons oil and gas organizations must implement an industrial cybersecurity program

32. Cybersecurity Considerations: Pinch a Dollar, Compromise a Terabyte

33. CYBERSECURITY IN RAIL: Protecting rail infrastructure from all angles

34. Cybersecurity in der Industrie: So sichern Unternehmen ihre Produktion

35. Global cybersecurity talent gap widens

36. Healthcare Services discloses cybersecurity incident

37. How AI Is Revolutionizing Cybersecurity (And Why You Should Care)

38. Cybersecurity experts discuss problems and solutions for businesses, individuals

39. American Water in process of reactivating systems after cybersecurity incident

40. Telesign Wins CyberSecurity Breakthrough Award in 'Overall Fraud Prevention Solution Provider of the Year' Category

41. Hyundai's IPO documents offer rare glimpse into its cybersecurity firewall

44. I'm a former FBI agent and cybersecurity expert. Here are 5 things everyone should do to outsmart online criminals

45. CrowdStrike Expands Cybersecurity Startup Accelerator with AWS and Nvidia

46. Calian Group, Microsoft collaborate on cloud-native cybersecurity solutions

47. Chile's CCU loses data in cybersecurity breach

48. CISO viewpoint part 2: Finding pearls among perils with AI productivity solutions

49. Fortinet announces progress on mission to tackle cybersecurity skills shortage

50. Cybersecurity Experts Provide Insight on The ROI of Managed Cybersecurity Services

Catalog

Books, media, physical & digital resources