Resources Home

Alpha List

Search by Keywords

Browse by Topic

Get RSS Updates!

Information Technology > Security > Authentication - Encryption

Browse through our extensive list of free Authentication - Encryption magazines, white papers, downloads and podcasts to find the titles that best match your skills; Simply complete the application form and submit it. All are absolutely free to professionals who qualify.

Sort by: Popularity | Title | Release Date

BAE Systems Business Defense The evolution from cyber security to business defense...
Your Money or Your Files! A Short History of Ransomware and Countermeasures This white paper provides a history of ransomware and what to do..
Ransomware Hostage Rescue Manual for IT Pros This manual is packed with actionable info that you need to prevent infections, and what to do..
How to Deal with Stealthier Phishing and Malware Attacks Learn key IT Security best practices like how users can be mobilized as your first..
Eight Key Pressures on Security Operations Identify key pressures and regain control of your security operations...
Multi-Factor Authentication Without Tokens or Passwords Veridium's white paper explains how to use biometric authentication to access Active..
Security TechTalk: Identity and Access Management Secure access to your apps, data and network while enhancing the user experience...
Employees at the Frontline in the Battle Against Ransomware The recent escalating ransomware attacks have shown that no organization is safe..
How to Transform Employee Worst Practices Into IT Security Best Practices Get clear direction on how to improve your organization's security..
Cryptographic Storage Cheat Sheet This cheat sheet provides a simple model to follow when implementing solutions for data at rest...
Contemporary Cryptography These slides are intended for computer scientist, electrical engineers, and mathematicians both in research and..
6 Questions For a Prospective Cloud Service Provider Develop a strategy for how to select the right vendor for your business...
Three Ways to Integrate Active Directory with Your SaaS Applications This paper will discuss three different options for integrating Active..
Cybersecurity: A Small Business Guide An overview of everything you need to know to protect yourself and your business...
Ensuring PCI Compliance with Identity and Access Management Learn from an industry expert how to comply with the Payment Card Industry Data..
11 Practical Steps to Reduce the Risks of Zero-Day Attacks This paper explains the dangers of zero-day attacks and why traditional defenses..
5 Ways to Encrypt Email for Linux Email is still important for business, and it is necessary to keep it encrypted. Here are 5 ways you can..
Security for E-Signatures and E-Transactions Discover how to build effective, end-to-end security around your business tractions with..
11 Security Solutions for Small Business Here are 11 small-business-friendly cybersecurity solutions to get you started on protecting your..
The Complete Guide to Simplifying and Securing Your Life with LastPass and Xmarks By downloading this free guide, you agree to receive..
Cyber Warnings E-Magazine - May 2017 Edition Published monthly by Cyber Defense Magazine, Cyber Warnings shares a wealth of information to..
PasswordCourier Transparent Synchronization Learn how to synchronize passwords using native password change tools in supported systems and..
Clickjacking Defense Cheat Sheet This cheat sheet is focused on providing developer guidance on Clickjacking/UI Redress attack prevention...
Modern Retail Security Risks: Avoiding Catastrophic Data Breaches in the Retail Industry Download this guide to learn more about how to..
Security Across the Enterprise - Customer Success Stories Welcome to a collection of success stories provided by our valued customers..
Authentication Cheat Sheet Excellent authentication guidance in an easy to read format..
Adding Value Research Brief for Affinity Organizations The more information people share online, the more they have at risk...
5 Things You Need to Know about Security and UC The decision to invest in new technology should never be taken lightly...
Remove Risk and Simplify with Multifactor Authentication Learn the important factors you need to consider when moving to MFA, plus 4 things..
Multi-Step Authentication and Why You Should Use It Authentication is one of the essential components of security; it is one part of the..
Crypto 101 Want to know how to exploit a common cryptographic flaw or forge administrator cookies, recover passwords?..
Oracle Web Services Manager: Authentication and Authorization A free sample chapter from Packt Enterprise's book: Oracle Web Services..
An Overview of Okta's Multifactor Authentication Capability Learn how Okta brings multifactor authentication to the cloud for both higher..
5 Reasons for Federated Single Sign-On In this eBook, we discuss federated Single Sign-On and the value it can bring to your organization...
Best Practices for Handling a Data Breach It only takes one stolen laptop, one employee's USB stick, one hacker, one virus, or one careless..
After A Data Breach: Managing Identity Theft Effectively Life can seem surreal for identity victims...
Architecting Active Directory Federation across Office 365, Azure and On Premises IT This recorded webinar focuses specifically on..
Two-Factor Authentication Evaluation Guide The ultimate guide to assessing and comparing two-factor authentication solutions...
Managing Change and Complexity with Identity and Access Governance In this white paper, we will examine some of the challenges that modern..
Cyber Security Threat Report: A View From the Front Lines Take a look at the cyber threat landscape as reported from investigations in more..
MongoDB Performance with Vormetric Transparent Encryption In enterprises around the world, data volumes have been undergoing explosive..
Under the Hood: Updates and Improvements in Active Directory Tools for Windows Server 2012 Master Active Directory management in Windows..
Ensuring HIPAA and HITECH Compliance with Identity and Access Management View this on-demand webinar to learn how leading healthcare..
Beginner's Guide to Multi-factor Authentication Cut through the authentication jungle...
17 Questions to Ask Your IAM Provider This paper provides 17 important questions to ask your current or potential IAM provider so that you..
PasswordCourier with Telephone Access Learn how to reset forgotten passwords through an Interactive Voice Response application, using a..
Privacy and Security Advantages of Social Login The practice of solely implementing traditional username/password authentication flows on..
Looking Forward: Today's Risks Require Tomorrow's Authentication This white paper discusses the changing landscape and business drivers..
Password Your Days are Numbered Review this infographic to get a sense of why many enterprises are moving away from passwords as a main..
A New Look at the ROI for Enterprise Smart Cards Learn about the latest trends in smart card deployments, the value of converged access, SSO..
Password Reset: The Time Vampire of the IT Universe Maybe Passwords Aren't Dead After All...
A Comprehensive Mobile Threat Assessment Find out what FireEye researchers uncovered when they analyzed more than 7 million iOS and Android..
FFIEC Authentication Guidance: How to Conform to Combat Fraud Fraud prevention best practices for IT professionals in banks and credit..
How to Make a Case for Investing in an Integrated Cyber Security Platform This white paper demonstrates the ROI of FireEye as a Service to..
Multi-factor Authentication Evaluation Checklist The need for multi-factor authentication is clear, but knowing how to find the solution..
IT Security Vendor Analysis by Bizety This paper examines 5 major vendors and outlines how their products can coordinate to successfully..
Security and Usability: How New Authentication Methods Eliminate Old Trade-offs There's a long history of trade-offs between security and..
Protect Yourself and Your Company from Advanced Cyber Attacks This self-assessment is designed to point you in the right direction as you..
IT Security Alerts: How Many is Too Many? Assess the current state of your alert process and start to improve your organization's management..
Two-Factor Authentication Evaluation Guide Learn what to look for when assessing and comparing two-factor authentication solutions...
Why You Should Care About Identity-as-a-Service (IDaaS): An Expert's perspective There's a lot of discussion going on lately about identity...
Microsoft 70-640 Windows Server 2008 - Special Edition Practice Exam Prep Software and Study Guide Provides their unique triple testing mode..
API Security: A Disjointed Affair This white paper analyzes the findings of a survey into the state of Application Programming Interface..
Enterprise Password Management - A Guide for Best Practices Learn how using RoboForm Enterprise is an easy, secure, and practical solution..
IxSecure: 360° Security Protection Security is much more than layers of defense...
 
Copyright © 2017 NetLine Corporation. All rights reserved.
750 University Avenue | Suite 200 | Los Gatos, CA 95032
By submitting a request, your information is subject to TradePub.com's Privacy Policy.
Resources: | FAQ | Legal Notices