Internet security Staying safe online

July 3, 2019

This information guide has been prepared by Age UK and contains general advice only, it should not be relied on as a basis for any decision or action and cannot be used as a substitute for professional medical advice. Neither Age UK nor any of its subsidiary companies or charities accepts any liability arising from its use and it is the reader’s sole responsibility to ensure any information is up to date and accurate.

Spotlight

StrongAuth, Inc

StrongAuth, Inc. is a privately held company based in Silicon Valley, California. It is an innovator in enterprise key management solutions. Providing products and services in symmetric key management, encryption, tokenization and PKI, StrongAuth is focused on securing data in the areas of cloud computing, e-commerce, healthcare, finance and other sectors mandating protection of sensitive data. StrongAuth's solutions are installed at customer sites in five continents and are key components of mission-critical business operations.

OTHER WHITEPAPERS
news image

CISA Stakeholder-Specific Vulnerability Categorization Guide

whitePaper | November 9, 2022

The CISA Stakeholder-Specific Vulnerability Categorization (SSVC) is a customized decision tree model that assists in prioritizing vulnerability response for the United States government (USG), state, local, tribal, and territorial (SLTT) governments; and critical infrastructure (CI) entities. This document serves as a guide for evaluating vulnerabilities using the CISA SSVC decision tree. The goal of SSVC is to assist in prioritizing the remediation of a vulnerability basedon the impact exploitation would have to the particular organization(s).

Read More
news image

Ransomware Data Recovery Architectures

whitePaper | September 26, 2022

Ransomware attacks have been on the rise in recent years. They are extremely insidious in nature and have been foremost in many CEOs’ and CIOs’ minds lately. Ransomware is malware that prevents an enterprise from accessing and using its data, usually by encrypting the data in an inconspicuous manner so the victim does not know the attack is occurring.

Read More
news image

Cyber Security After the Pandemic

whitePaper | April 29, 2021

The cyber security industry has faced two major sets of challenges over the last twelve months. The attacks and exploits affecting Solar Winds, Accellion, Microsoft and their customers have focused attention on supply chain risk, but the impact of the coronavirus pandemic has been felt more broadly across cyber security domains and disciplines.

Read More
news image

Cybersecurity and Financial SystemResilience Report

whitePaper | July 27, 2022

The Consolidated Appropriations Act, 20211 (CAA) requires the Federal Reserve Board (Board) to submit annually for seven years a report focused on cybersecurity to Congress. The CAA calls for a description of measures the Board has undertaken to strengthen cybersecurity within the financial services sector and with respect to the Board’s functions as a regulator, including the supervision and regulation of financial institutions and third-party service providers.

Read More
news image

The State of Zero Trust Security 2022

whitePaper | September 27, 2022

The philosophy of Zero Trust security—“never trust; always verify”—has certainly struck a chord. It took decades for organizations to move past the basic castle andmoat security mindset, and to accept that in a cloud world, there is no perimeter to defend, and intruders are always on our networks.

Read More
news image

2022 Cyber Security Report

whitePaper | July 25, 2022

The past twelve months represents one of the most turbulent and disruptive periods on record, at least as far as security is concerned. As governments and businesses around the world continued to navigate the uncharted waters of a global pandemic, the so-called “new normal” still felt a long way off. Digital transformation efforts were dramatically accelerated as businesses embraced hybrid and remote working arrangements, but the same questions around security maturity that plagued many businesses in 2020 persisted through 2021.

Read More

Spotlight

StrongAuth, Inc

StrongAuth, Inc. is a privately held company based in Silicon Valley, California. It is an innovator in enterprise key management solutions. Providing products and services in symmetric key management, encryption, tokenization and PKI, StrongAuth is focused on securing data in the areas of cloud computing, e-commerce, healthcare, finance and other sectors mandating protection of sensitive data. StrongAuth's solutions are installed at customer sites in five continents and are key components of mission-critical business operations.

Events