Secure communication

Results: 3134



#Item
461Secure communication / Cyberwarfare / Crime / Computer security / National security / Identity theft / Data breach / Data security / Laptop theft / Security / Computer network security / Theft

Notification to Inspira Patients of Potential Data Breach After Computer Theft Inspira Health Network notified 1,411 patients in February, 2014 of a potential data breach. Two computers were stolen from the radiology dep

Add to Reading List

Source URL: www.inspirahealthnetwork.org

Language: English - Date: 2014-03-26 10:37:48
462Portable software / Cloud clients / Secure communication / Adobe Flash Player / Adobe Acrobat / Google Chrome / Internet Explorer / Firefox / HTTP Secure / Software / News aggregators / FTP clients

Technical Specs Hardware, Software, and Browser Requirements These specifications represent the ideal hardware, software, and browser requirements for PointClickCare EHR and eMAR. PointClickCare

Add to Reading List

Source URL: pages.pointclickcare.com

Language: English - Date: 2015-05-31 21:59:51
463Information / HTTP / HTTP Secure / Secure communication

CorrLinks Video Service FAQ General Questions & Answers Answers basic questions about CorrLinks Video Service.

Add to Reading List

Source URL: corrlinks.blob.core.windows.net

Language: English - Date: 2015-05-04 16:48:10
464Secure communication / Cryptography / Email / HTTP / HTTP Secure / Password / Transport Layer Security / Phishing / Jumbleme / Internet / Computing / Cryptographic protocols

NJM Security Policy Protecting Your Information: NJM protects customers’ information with physical, technical, and procedural controls and maintains compliance with federal and state regulations. We employ in-house as

Add to Reading List

Source URL: www.njm.com

Language: English - Date: 2014-12-15 09:48:42
465Public-key cryptography / Key management / Man-in-the-middle attack / Secure messaging / Public key infrastructure / ZRTP / Secure communication / S/MIME / Digital signature / Cryptography / Cryptographic protocols / Internet privacy

SoK: Secure Messaging1 Nik Unger∗ , Sergej Dechand† Joseph Bonneau‡§ , Sascha Fahl¶ , Henning Perl¶ Ian Goldberg∗ , Matthew Smith† ∗

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2015-04-14 13:29:35
466Cyberwarfare / Secure communication / Data security / National security / ChoicePoint / Identity theft / Data breach / Privacy / Internet privacy / Security / Computer network security / Computer security

Testimony before the House Energy and Commerce Subcommittee on Commerce, Manufacturing, and Trade Hearing on “The Threat of Data Theft to American Consumers” May 4, 2011

Add to Reading List

Source URL: spaf.cerias.purdue.edu

Language: English - Date: 2011-05-04 23:16:03
467Electronic commerce / Cryptographic protocols / Secure communication / Extended Validation Certificate / CA/Browser Forum / Root certificate / Entrust / Certificate authority / X.509 / Cryptography / Key management / Public-key cryptography

Microsoft Word - EV SSL CPS Englishv1 7.doc

Add to Reading List

Source URL: www.entrust.net

Language: English - Date: 2015-05-21 14:11:21
468Data security / Cyberwarfare / Data breach / Secure communication / Anthem / Blue Cross Blue Shield Association / Computer security / Security / Computer network security

ANTHEM DATA BREACH – NOTICE TO IMPACTED MEMBERS Mar. 02, 2015 View Notice to Impacted Members View Notice to Impacted Members – en Español Blue Cross and Blue Shield of Montana (BCBSMT) has confirmed that some membe

Add to Reading List

Source URL: www.bcbsmt.com

Language: English - Date: 2015-03-04 15:53:34
469Cryptographic protocols / Key management / Secure communication / HTTP Strict Transport Security / HTTP Secure / HTTP cookie / Public key certificate / Certificate authority / Transport Layer Security / Cryptography / Public-key cryptography / HTTP

S-links: Why distributed security policy requires secure introduction Joseph Bonneau Google Inc. Abstract—In this paper we argue that secure introduction

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2013-05-23 04:10:01
470Secure communication / Cryptographic software / Internet standards / Cipher suite / Secure Shell / Transport Layer Security / HMAC / Key size / Public-key cryptography / Cryptography / Cryptographic protocols / Internet protocols

Microsoft Word - 1c - FIPS Avaya Draft Security Policy Jan2015 v4.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-07 14:15:51
UPDATE