IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security White Papers (View All Report Types)
76 - 100 of 1330 Matches Previous Page  |  Next Page
The Pressing Need for Digital Risk Management
sponsored by Digital Shadows
WHITE PAPER: According to ESG research, 69% of organizations are increasing their cybersecurity budgets. This ESP report reveals how CISOs and risk officers can adopt a thorough risk management strategy to protect their enterprise from pressing cyber threats.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

Moving your Database to the Cloud
sponsored by Quest
WHITE PAPER: Explore how to move your databases to the cloud as well as what the consequences of that that move are. Deepen your understanding of the cloud, from its elasticity to potential for self-service, and learn about different deployment and service models for the cloud.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Quest

2018 Database DevOps Survey
sponsored by DBMaestro
WHITE PAPER: Inside, uncover key findings from DBmaestro's annual Database DevOps Report, along with the challenges and best practices of companies using or looking to implement DevOps for databases.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

DBMaestro

Demystifying Cloud Security
sponsored by Workday
WHITE PAPER: In the CIO.com report "Demystifying Cloud Security," you'll learn why the cloud is your best bet for data security and discover additional benefits your business could experience by moving to the cloud.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Workday

Top Cyber Threats to the Legal Sector
sponsored by Digital Shadows
WHITE PAPER: Legal firms can be attractive targets for cybercriminals, especially firms working on mergers and acquisitions (M&A), possessing a large amount of sensitive, non-public information. This paper highlights 3 security risks for legal firms to focus on and how to mitigate them.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Top Cybercrime Threats to Financial Institutions
sponsored by Digital Shadows
WHITE PAPER: The most prevalent cybercrime threats against financial institutions are: the use or sale of ATM malware, targeted network intrusions, data breaches and the use of banking Trojans. Take a look at this white paper to learn more about these financial threats that stem from cybercriminals.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Protect Your Customer and Employee Accounts
sponsored by Digital Shadows
WHITE PAPER: Digital Shadows found that 97% of the largest companies in the world had their credentials exposed. Explore this white paper to learn how to mitigate the growing risks of account takeovers and the measures you can take to ensure your organization is better protected.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Controlling and Managing Privileged Access
sponsored by One Identity
WHITE PAPER: According to a Black Hat Report, 32% of hackers say accessing privileged accounts is the easiest and fastest way to get at sensitive data. This white paper explores the risks associated with privileged accounts and offers strategic risk mitigation tactics you can take to ensure security.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

One Identity

Equifax Breach: Lessons Learned for your Organization
sponsored by Digital Shadows
WHITE PAPER: The Equifax data breach potentially affected 143 million individuals in the US, Canada and the UK. Inside, gain insight into the impacts of the Equifax Breach, 6 lessons learned from the breach, and how your enterprise can mitigate the risks of falling victim to such a devastating data breach.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

Digital Shadows

Need More Oomph from Oracle
sponsored by Oracle & Explorer
WHITE PAPER: Find out how to control Oracle costs better while improving database performance by learning how to conduct an Oracle Architecture Review.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

Oracle & Explorer

Securing Business Information with Box
sponsored by Box
WHITE PAPER: Discover how to centralize control over content and collaboration in a way that facilitates productivity without sacrificing security and learn about Box's content management platform.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

Box

6 GDPR Compliance Pitfalls & How to Avoid Them
sponsored by Collibra
WHITE PAPER: The GDPR is a complex regulation. And on the path to compliance, there will be unanticipated roadblocks. The good news is, you can find your way through them.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

Collibra

Balancing Security and Flexibility for Collaboration
sponsored by Box
WHITE PAPER: Explore the most pressing challenges facing secure collaboration as well as the top reasons employees turn to consumer tools in the workplace. Learn how to enable truly secure, centralized collaboration in the cloud that restores IT's control and delivers positive user experiences for employees.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

Box

How to Shift Your Analytics Strategy to Keep Up with Industry Change
sponsored by Looker
WHITE PAPER: Actionable BI is critical for all organizations – but many lack the ability to analyze data quickly, comprehensively and effectively. Looking at healthcare, learn how embedded analytics tools that deliver self-service reporting capabilities can reduce barriers to success.
Posted: 02 Nov 2017 | Published: 02 Nov 2017

Looker

Introduction to Artificial Intelligence for Security Professionals
sponsored by Cylance
WHITE PAPER: According to Gartner, by 2018, 25% of security products used for detection will have some form of machine learning built into them. Explore this 155 page e-book to learn more about artificial intelligence and machine learning for security professionals.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

Cylance

10 Traits Of Successful DLP Programs
sponsored by InteliSecure
WHITE PAPER: According to Gartner, by 2018, 90% of organizations will implement at least one form of integrated DLP. This white paper reveals 10 traits of successful DLP programs to increase the effectiveness of your program.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

InteliSecure

Operationalize Your Organization for the GDPR
sponsored by InteliSecure
WHITE PAPER: Learn how creating a general data protection regulation framework to protect critical assets, both tangible and intangible (think IP), will enable you to operationalize your GDPR compliance.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

InteliSecure

5 Key Analytics and Machine Learning Takeaways
sponsored by Splunk
WHITE PAPER: Explore the top 5 analytics takeaways from Splunk's .conf2017 about everything from predictive analytics and machine data to threat intelligence.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

Splunk

Multi-factor Authentication for dummies
sponsored by iovation, Inc.
WHITE PAPER: The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

iovation, Inc.

Five Reasons to Reevaluate Your Current Backup Approach
sponsored by Acronis
WHITE PAPER: By downloading this resource, you'll discover 5 reasons you may need to reevaluate your current backup approach. Read on to see a platform that enables instant recovery from ransomware, supports all major hypervisors, and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Acronis

Technology Evolves - Your Backup Should Too
sponsored by Acronis
WHITE PAPER: As technology evolves and become more complex, your security stance should too. Explore this white paper to gain insight into how you can boost your security backup strategy to protect against ransomware, stop data loss, and improve compliance and validity of your recovery.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Acronis

The Race to Readiness
sponsored by Citrix
WHITE PAPER: According to a study conducted by Verizon, 63% of security breaches involve weak or stolen credentials. This white paper offers 4 steps and explanations to getting a head start on GDPR data security to help your enterprise protect against breaches.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Citrix

Data Protection on HCI Platforms
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Data protection is critical for disaster recovery and business continuity, and is one of the key evaluation markers for organizations purchasing IT infrastructure. This paper discusses HCI's impact on data protection, key factors to consider, data protection best practices and recommendations on when and how to use them for various use cases.
Posted: 07 Nov 2017 | Published: 30 Jun 2017

Hewlett Packard Enterprise

Using Hyperconverged Infrastructure to Improve Data Protection and Recovery Effectiveness
sponsored by Hewlett Packard Enterprise
WHITE PAPER: IT organizations need to take a fresh look at their approach to data protection and availability, and move beyond the limitations of client/server era technologies. Access this IDC white paper to learn how hyperconverged infrastructure simplifies and improves data protection and recovery effectiveness.
Posted: 07 Nov 2017 | Published: 31 May 2017

Hewlett Packard Enterprise

How to Secure Your Data and Protect Your Bottom Line
sponsored by IBM
WHITE PAPER: New technology trends, including cloud, mobile and big data, create opportunities for your enterprise to exploit analytic insights. But the same things that enable these opportunities can skyrocket your risks if proper data security and governance controls aren't in place. Learn how you can protect your data to avoid risk.
Posted: 03 Nov 2017 | Published: 03 Nov 2017

IBM
76 - 100 of 1330 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement