IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
176 - 200 of 2560 Matches Previous Page  |  Next Page
Why Banks Need a Dedicated Mobile Banking Security System
sponsored by HID Global
WHITE PAPER: According to a study conducted by Ratewatch, 81% of financial institutions surveyed are currently offering mobile banking services, but 36% of consumers say they are not using it because they're worried about security risks. This white paper reveals 5 FAQs to help banking organizations make smart decisions when evaluating mobile banking security.
Posted: 20 Oct 2017 | Published: 31 Dec 2016

HID Global

3 Types of SSL Certificates
sponsored by HID Global
RESOURCE: Are you making the right choice when it comes to your SSL certificate? Take a look at this resource to gain insight into 3 types of SSL certificates to see if you are making the right choice specific to your business.
Posted: 20 Oct 2017 | Published: 13 Jul 2017

HID Global

What is Multi-factor Authentication?
sponsored by HID Global
VIDEO: Users and passwords can be your weakest link. Watch this brief overview of multi-factor authentication to protect your company.
Posted: 19 Oct 2017 | Premiered: 19 Oct 2017

HID Global

5 Steps to Implement & Maintain PCI DSS Compliance
sponsored by AlienVault
WHITE PAPER: Achieving and maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be difficult. Explore this white paper to uncover 5 steps to take to make the compliance process easy and secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

10 Tips to Thrive in the Subscription Economy
sponsored by Adyen
WHITE PAPER: Learn 10 tips to thrive in the subscription economy so that you can improve customer experiences and discover a payment platform designed to help you optimize growth across online, in-app, and in-store channels.
Posted: 18 Oct 2017 | Published: 18 Oct 2017


European Businesses: You have a BYOD programme whether you like it or not
sponsored by Lookout
WHITE PAPER: 18% of federal employees with smartphones report encountering malicious software or malware. This white paper reveals how to secure your mobile devices from malware and protect your business as a whole from data loss.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Lookout

How Splunk Enables Fast Data Science for Cybersecurity Operations
sponsored by Splunk
WEBCAST: Discover how to bridge the gap between data scientists and security analysts to accelerate intelligence for cybersecurity operations. Plus, find out how Splunk's machine learning-enabled analytics provides a unified system for collecting, digesting, and querying data.
Posted: 12 Oct 2017 | Premiered: Sep 30, 2017

Splunk

A 5 Minute Guide to Cognitive Search for the Life Sciences
sponsored by Attivio, Inc.
WHITE PAPER: Learn about cognitive search platforms and find out how to analyze any type of data, integrate behavioral data to personalize user experiences, scale for big data, enhance data security, and more.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

Attivio, Inc.

Proofpoint Threat Response
sponsored by Proofpoint, Inc.
WHITE PAPER: How can you prevent security alerts and incidents from escalating into full-blown breaches? In this white paper, gain insight into the benefits of a threat response platform, and see how you can use it to prioritize and execute response actions.
Posted: 10 Oct 2017 | Published: 10 Oct 2017

Proofpoint, Inc.

Preparing for the Big One: General Data Protection Regulation
sponsored by Smarsh
WHITE PAPER: Even if your organization is not physically located in the EU, the GDPR will most likely affect you as well. In this white paper, gain insight into GDPR requirements and what your organization must do to comply.
Posted: 09 Oct 2017 | Published: 09 Oct 2017

Smarsh

A Practical Guide for GDPR Compliance
sponsored by Smarsh
WHITE PAPER: GDPR is coming fast and complying with the regulation is not optional. In this research report, discover why GDPR is important, the essential requirements of it, and a checklist for GDPR compliance.
Posted: 06 Oct 2017 | Published: 31 Jul 2017

Smarsh

Learning to Love GDPR E-Book
sponsored by Box
EBOOK: Coverage on GDPR has largely been negative but the regulation is really an opportunity to get your company's data privacy and content management in order, and in turn, positively impact business outcomes. Learn more about GDPR and how to prep your cloud content management strategy.
Posted: 06 Oct 2017 | Published: 06 Oct 2017

Box

Information Lifecycle Management: Harness The Power Of Your Data
sponsored by Cintra
WHITE PAPER: Discover how to create a comprehensive information lifecycle management (ILM) strategy. Find out how to take a 4 tiered approach to categorizing and managing your data and learn about the key pillars of ILM.
Posted: 05 Oct 2017 | Published: 31 Dec 2016

Cintra

From the Top: What Executives Need to Know About Cybersecurity
sponsored by Kaspersky Lab
WHITE PAPER: $117,000 is the average financial impact of a data breach for SMBs in North America and $1.3 million is the average impact for a large enterprise in North America. This paper identifies 6 myths about enterprise security to help you strengthen your approach, so you do not fall victim to data breach's large financial impact.
Posted: 04 Oct 2017 | Published: 04 Oct 2017

Kaspersky Lab

Top 3 Ways HyperScale for OpenStack Protects your Applications and Data
sponsored by Veritas
WHITE PAPER: Ensuring adequate data protection is critical before placing workloads (and the corresponding data that they operate upon) into production. This tip sheet outlines the 3 ways in which Veritas HyperScale for OpenStack keeps your applications and data safe.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Veritas

Leveraging a Revolutionary Software-Defined Storage Architecture for OpenStack-Based Clouds
sponsored by Veritas
WHITE PAPER: Enterprises are adopting private clouds to meet business demands, address competitive pressures and realize benefits such as cost-effectiveness and agility. Veritas HyperScale for OpenStack employs a new architecture that uses direct attached storage and divides the storage functionality across two separate planes. Read on to learn more.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Veritas

IT Security: Cost Center or Strategic Investment?
sponsored by Kaspersky Lab
WHITE PAPER: Understanding the math behind the cost of a cyberattack is more crucial now than ever. By reading this white paper, gain a deeper understanding of the cost of IT security incidents and how to move your organization forward in preventing data breaches.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Kaspersky Lab

The Human Factor in IT Security: How Employees Are Making Businesses Vulnerable from Within
sponsored by Kaspersky Lab
WHITE PAPER: 52% of businesses admit that employees are their biggest weakness in IT security, with their careless actions putting data and networks at risk. In this white paper gain insight into how to address the "human factor" dilemma and eliminate employee irresponsibility by following the right steps forward.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Kaspersky Lab

Lightning Speed: Getting to the Cloud Faster
sponsored by Commvault
WHITE PAPER: You need to get your organization into the cloud before your employees start doing it on their own, creating a shadow IT nightmare. Access this white paper to learn how to get to the cloud faster than your employees can put your organization at risk.
Posted: 02 Oct 2017 | Published: 31 Dec 2015

Commvault

Threat Intelligence Evaluator's Guide
sponsored by AlienVault
WHITE PAPER: One of the most critical weapons that can be used in cyber defense is threat intelligence. This white paper reveals a threat intelligence guide to help you evaluate service providers, so that you can pick which is best for you in preventing, detecting, and responding to emerging threats.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

Amazon Web Services: Overview of Security Processes
sponsored by Amazon Web Services
WHITE PAPER: You may be wondering, "how does AWS help ensure that my data is secure?" This document delivers the answer to this question and is intended to provide an overview of the security processes involved with Amazon Web Services.
Posted: 16 Oct 2017 | Published: 31 May 2017

Amazon Web Services

New Zealand Transport Agency Customer Success Story
sponsored by OpenText
VIDEO: Watch this brief video case study to find out how the NZ Transport Agency used enterprise content management as a service (ECMaaS) to improve the way they store, share, protect, and manage digital information.
Posted: 13 Oct 2017 | Premiered: 13 Oct 2017

OpenText

Hydro Tasmania Customer Success Story
sponsored by OpenText
VIDEO: Watch this brief video case study to find out how Hydro Tasmania unified scattered information and resolved content inefficiencies in their SAP, ERP, and SharePoint environments.
Posted: 13 Oct 2017 | Premiered: 13 Oct 2017

OpenText

AWS Security Checklist
sponsored by Amazon Web Services
WHITE PAPER: Utilize these security checklists to help secure your AWS resources. Follow recommendations from AWS for the AWS Identity and Access Management (IAM) service, Amazon EBS Encryption, Amazon S3 Resources and much more.
Posted: 10 Oct 2017 | Published: 10 Oct 2017

Amazon Web Services

Steps to Protect Your Growing Data
sponsored by SearchSecurity.com
EZINE: The distribution of data and the many ways in which it can be accessed has made handling data protection risks especially challenging. In this issue of Information Security, security experts examine data protection risks and considerations for implementing a data - centric security model.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

SearchSecurity.com
176 - 200 of 2560 Matches Previous Page    6 7 8 9 10 11    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement