proofpoint – What is Email Filtering? 3.13 3.13.16
This article explains the definition, appliances, email filtering techniques, and solutions.
This article explains the definition, appliances, email filtering techniques, and solutions.
In this article, Pure Storage looks at what the Federal Information Processing Standard (FIPS) is, how to become FIPS compliant, and what it means for your organization.
This blog post details how security focused configuration management is an active component of security.
This article describes several video conferencing security best practices.
This sample policy provided by SANS can be customized and used to address remote access.
This SANS checklist provides a generic listing of security considerations to be used when auditing the technical aspects of a firewall.
This whitepaper from SANS discusses firewall and perimeter protections focusing on defense-in-depth.
This SANS whitepaper discusses the use of Public Key Infrastructure (PKI) to meet business, regulatory, and compliance requirements.
This SANS whitepaper describes firewall and perimeter protections.
This SANS whitepaper defines FIPS, identify FIPS approved encryption algorithms, and examine some different vendor solutions and their use of these approved algorithms.