40,096 results on '"data security"'
Search Results
2. Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher.
3. ПРОБЛЕМА ЗАХИСТУ ПЕРСОНАЛЬНИХ ДАНИХ В КІБЕРПРОСТОРІ
4. Securing IoT healthcare platform with lightweight encryption.
5. How to Hit the Moving Target of Medical Device Cybersecurity: Metaphoric archers may also be challenged to extend their skills when it comes to predicate comparisons for cyber devices
6. The Cost of Cybersecurity in Medtech: Who will ultimately pay for the cybersecurity requirements that loom over the industry?
7. Cybersecurity in der Lieferkette Wie Sie Ihre Software-Supply-Chain schützen
8. CSO30 ASEAN 2024: The top 30 cybersecurity leaders in Southeast Asia and Hong Kong
9. Schneider Electric suffers data breach, exposing critical project and user data
10. Kicking dependency: Why cybersecurity needs a better model for handling OSS vulnerabilities
11. 5 Top Cybersecurity-Zertifizierungen: So pushen Sie Ihre CISO-Karriere
12. An inside look at Mapfre’s 2020 ransomware response
13. Change Healthcare data breach exposed ‘only’ 100 million US health records
14. How AI is becoming a powerful tool for offensive cybersecurity practitioners
15. Governments fear election interference, but it’s an enterprise cybersecurity problem too
16. Malware attack on State Data Center in India puts some citizen services at a standstill
17. Download the Emerging Cybersecurity Issues Enterprise Spotlight
18. Evaluating applied security controls for safeguarding medical device‐integrated electronic medical records.
19. West African online learning spaces security status and students' cybersecurity awareness level during COVID-19 lockdown.
20. Strengthening big data security and privacy in libraries: A Review of ISO standards and real-world cyberattack case studies.
21. DIGITAL TECHNOLOGIES IN THE FINANCIAL SECTOR OF THE ECONOMY.
22. Intelligent Threat Detection—AI-Driven Analysis of Honeypot Data to Counter Cyber Threats.
23. Machine Learning in Cybersecurity: Advanced Detection and Classification Techniques for Network Traffic Environments.
24. PRO AV & CYBERSECURITY: NO COMPLACENCY AS FULL SCOPE OF ATTACKS INCREASES: From software vulnerabilities affecting APIs to massive state-sponsored cyberattacks, it's not hard to understand why professional environments across the board are placing a greater emphasis than ever on cybersecurity
25. CYBERSECURITY TO THE FOREFRONT: How pension plan sponsors are using the latest technology and detection systems to stay ahead of evolving digital threats
26. Cybersecurity Risk Audit: Literature Review, Proposal, and Application/Auditoria de riesgos de ciberseguridad: Revision de Literatura, propuesta y aplicacion
27. Protect your business from AI-powered security threats
28. DYOPATH:Sandler Top Cybersecurity Provider
29. Cybersecurity competition winners, teacher raises, career night, virtual school enrollment and more
30. US grocery stores hit by cybersecurity outage at food giant
31. Cybersecurity in IoT & IIoT
32. The Vital Role of Cybersecurity for Start-Up Companies: A Personal Journey
33. Christian Müller, Head of Cyber Security bei Skaylink: 'Managed Security Services sind sehr effizient'
34. Is Microsoft Copilot a productivity booster or a cybersecurity risk?
35. Retail Tech: How Brands Safeguard Customer Data in the Digital Age
36. Can strategic AI deployment reduce cybersecurity burnout?
37. Let's Try - For U & Me: SageMath: A Quick Introduction to Cybersecurity
38. Education: Cybersecurity - Safeguarding Student Data in a Digital Age
39. Essential insights for companies on international cybersecurity compliance
40. Australia is moving rapidly to cybersecurity resilience: how Crayon is doing its part to support partners
41. Crayon provides partners with the platform and support to handle New Zealand’s growing cybersecurity crisis
42. Crayon’s Promise to Partners: Empowering Growth Through Strategic Cybersecurity Support
43. DataCore Powers NIS 2 Compliance with Cybersecurity Solution
44. INE Security Alert: Learning From Cybersecurity Breaches
45. Quectel EG91-EX LTE Cat 1 module receives EU RED Cybersecurity Certification
46. Quectel EG91-EX LTE Cat 1 Module Receives EU RED Cybersecurity Certification
47. Markt für IT-Sicherheit in Deutschland: Ausgaben für Cybersecurity klettern über 11 Milliarden Euro
48. Markt für IT-Sicherheit in Deutschland: Ausgaben für Cybersecurity klettern über 11 Milliarden Euro
49. Fortifying Electric Vehicle Infrastructure The Essential Cybersecurity Challenge Ahead
50. SolarEdge PV Inverter Receive Early Certification for European Commission's Mandatory Cyber Security Requirements
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.