IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security White Papers (View All Report Types)
1 - 25 of 1330 Matches Previous Page  |  Next Page
Don't Switch To Windows 10 Without An Endpoint Security Plan
sponsored by Thycotic
WHITE PAPER: According to the Thycotic 2017 BlackHat Report, 73% of hackers report that traditional anti-virus tools are irrelevant or obsolete, and don't adapt quickly enough to block emerging threats. This resource offers endpoint and application security strategies as well as tactics to enhance your Windows 7 and 10 security.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

Thycotic

Mitigate the Top 9 Cloud Threats with a Cloud Access Security Broker (CASB)
sponsored by Oracle Corporation
WHITE PAPER: According to Cloud Computing Trends: 2017 State of the Cloud Survey, today's enterprises run 41% of their workloads in a public cloud, and 38% in a private cloud. This white paper offers strategies for mitigating the top 9 cloud threats with a cloud access security broker (CASB).
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Oracle Corporation

Making the Case for a Cloud Access Security Broker (CASB)
sponsored by Oracle Corporation
WHITE PAPER: CASBs are one of the fastest growing security technologies today. According to Gartner, by 2020, 85% of large enterprises will use a cloud access security broker for their cloud services. Explore this resource to learn about why CASBs are important for improving your cloud security.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Oracle Corporation

Always on GDPR - The Visibility to Act Like the Pros
sponsored by Nuix
WHITE PAPER: The GDPR is estimated to implement $5.3 billion in fines by 2021, according to Nuix. To avoid the strict fines imposed by the regulation, a successful compliance strategy is critical. This resource offers an approach to effectively securing personal data through a more advanced method than your average cybersecurity strategy.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Nuix

Contingent Workers
sponsored by Identity Automation
WHITE PAPER: By 2020, approximately 40% of the average company's total workforce is expected to be contingent workers. The rise in contingent workers brings an insider security risk. Insiders are by far the weakest link in most organizations' security model. Take a look at this e-book and learn more about the threats insiders pose to your organization.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Identity Automation

The 2017 Trusted Access Report
sponsored by Duo Security
WHITE PAPER: The enterprise perimeter has been redefined by new networking models and with new technology, comes new security risks. Take a look at this 29-page report to learn about the evolution of enterprise security and overall device security health.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Duo Security

The Good Shepherd Model for Cybersecurity, Privacy, And Regulatory Compliance
sponsored by Nuix
WHITE PAPER: Data breaches are inevitable - If you can't prevent hackers or insiders from getting into your organization's network, it's vital to minimize the damage they can cause. This white paper reveals four rules for protecting private data to improve compliance with privacy regulations.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Nuix

Connected Intelligence: GDPR and Incident Response
sponsored by Nuix
WHITE PAPER: The GDPR will force organizations to reexamine how they handle consumers' personal information. Data breach investigations in just 72 hours —are you prepared? This white paper offers GDPR and incident response preparation strategies to ensure your enterprise is ready for the upcoming regulation.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Nuix

The Trouble with Phishing
sponsored by Duo Security
WHITE PAPER: Phishing is one of the most common threats hitting organizations and it is only getting worse. This guide offers insight into the problems around phishing, how it happens, and what your organization can do to defend against the damaging attacks.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Duo Security

3 Types of Rogue Employees and How to Stop Them
sponsored by Identity Automation
WHITE PAPER: Employees pose the greatest threat to any organization and have the capability to cause egregious harm and costs through data breaches, insecure transactions, and cyber theft. This e-book reveals 3 types of employees who pose security risks and offers strategic approaches utilizing IAM for mitigating these risks and improving your security.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Identity Automation

A Practical Guide for GDPR Compliance
sponsored by Nuix
WHITE PAPER: Most organizations are not yet adequately prepared for compliance with the GDPR. In fact, 64% of organizations are not ready to comply with the requirements. This white paper offers a practical guide for GDPR compliance, including insight into why the GDPR is important and its essential requirements.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Nuix

The GDPR Playbook
sponsored by Proofpoint, Inc.
WHITE PAPER: Is your business, brand reputation, and bottom line worth preserving? In order to comply with the GDPR and avoid the harsh penalties, creating a plan with the new rules is critical for all organizations. This GDPR playbook provides a roadmap to compliance and 7 key principles to know before May 2018.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Proofpoint, Inc.

Stripping the Malware Threat Out of PowerShell
sponsored by enSilo
WHITE PAPER: This white paper provides insight into PowerShell and how it is being leeched onto by threat actors. In addition, learn how to protect your endpoints against this increasing threat.
Posted: 15 Jan 2018 | Published: 15 Jan 2018


Vulnerable By Design: Why Destructive Exploits Keep On Coming
sponsored by enSilo
WHITE PAPER: Attackers can exploit design vulnerabilities and gain root access to highly secure systems leading to data theft, disruption of critical infrastructure and more. Explore this resource to gain insight into design vulnerabilities and malware which exploit them. In addition uncover the differences between design and security vulnerabilities.
Posted: 15 Jan 2018 | Published: 15 Jan 2018


An Intelligent Response to Rising Threats
sponsored by AdvizeX Technologies
WHITE PAPER: This white paper offers an approach to enhancing your current SIEM approach to improve security and protect against ransomware and malware targeting your enterprise's data.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

AdvizeX Technologies

Implications of the Data Breach Notification Requirements in the GDPR
sponsored by Fortinet, Inc.
WHITE PAPER: Globally, cybercrime damages are expected to double by 2021, totaling $6 trillion, according to CSO. This resource offers insight into the data breach notification requirements of the GDPR and provides strategies for preparing your data for the regulation.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Fortinet, Inc.

Endpoint Security and HIPAA Compliance
sponsored by enSilo
WHITE PAPER: A common requirement in virtually all regulatory compliance objectives and defense in depth strategies is to provide endpoint protection against malware and zero-day threats. Read this white paper to uncover a strategic approach to endpoint security while maintaining HIPAA compliance.
Posted: 15 Jan 2018 | Published: 15 Jan 2018


Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: According to a recent Verizon study, 40% of confirmed data breaches resulted directly from web app attacks. Explore this white paper to uncover a 3-step guide to gaining a mature application security program to prevent falling victim to damaging data breaches.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Veracode, Inc.

Finding GDPR noncompliance in a mobile first world
sponsored by Lookout
WHITE PAPER: With the proliferation of mobile devices in the workplace, whether company or employee owned, there is a greater risk of data loss or leakage. Whether they know it or not, your employees are putting your company's data--and GDPR compliance--at risk. This white paper is your guide to laying out the mobile portion of your GDPR strategy.
Posted: 15 Jan 2018 | Published: 26 Oct 2017

Lookout

Key Data Protection Requirements of GDPR
sponsored by Fortinet, Inc.
WHITE PAPER: To prevent attacks and adhere to the GDPR, advanced threat protection and detection is critical. This GDPR checklist offers everything your company needs to comply with the regulation as well as strategies for improving your security posture.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Fortinet, Inc.

Data Security Under GDPR: How to Prepare for the Inevitable
sponsored by Fortinet, Inc.
WHITE PAPER: Access this white paper to gain guidance on how to comply with GDPR when developing data protection policies.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Fortinet, Inc.

The Architecture of a Container Intelligence Platform
sponsored by Sysdig
WHITE PAPER: Containers are changing the way we run software, and you need a unified approach for monitoring, security, and forensics in containerized & microservice environments. Read this white paper to learn how an intelligent container platform helps you achieve this, emboldening your container strategy.
Posted: 11 Jan 2018 | Published: 29 Nov 2017

Sysdig

Run Critical Databases in the Cloud
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This white paper explores the question of whether or not a public cloud is suitable place to house your key databases. Learn about the Oracle Database Cloud, and find out how you can leverage a secure database as a service (DBaaS) platform.
Posted: 10 Jan 2018 | Published: 31 Dec 2017

Oracle Corporation UK Ltd

Filling the Gaps in Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper provides information from an Osterman Research survey regarding users' experience with Office 365 in regard to security and protection.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

Proofpoint, Inc.

Secure DevOps Survival Guide
sponsored by Veracode, Inc.
WHITE PAPER: DevOps is the most disruptive trend affecting secure development today. This resource provides you with the importance of securing DevOps and everything to know when adopting a DevOps approach.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

Veracode, Inc.
1 - 25 of 1330 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement