IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
26 - 50 of 2554 Matches Previous Page  |  Next Page
Finding GDPR noncompliance in a mobile first world
sponsored by Lookout
WHITE PAPER: With the proliferation of mobile devices in the workplace, whether company or employee owned, there is a greater risk of data loss or leakage. Whether they know it or not, your employees are putting your company's data--and GDPR compliance--at risk. This white paper is your guide to laying out the mobile portion of your GDPR strategy.
Posted: 15 Jan 2018 | Published: 26 Oct 2017

Lookout

Key Data Protection Requirements of GDPR
sponsored by Fortinet, Inc.
WHITE PAPER: To prevent attacks and adhere to the GDPR, advanced threat protection and detection is critical. This GDPR checklist offers everything your company needs to comply with the regulation as well as strategies for improving your security posture.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Fortinet, Inc.

Data Security Under GDPR: How to Prepare for the Inevitable
sponsored by Fortinet, Inc.
WHITE PAPER: Access this white paper to gain guidance on how to comply with GDPR when developing data protection policies.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Fortinet, Inc.

Orlin & Cohen Orthopedic Group Updates their Database Architecture
sponsored by Cintra
CASE STUDY: Find out how Orlin & Cohen Orthopedic Group adopted a highly available database architecture built on an Oracle Engineered Systems strategy with the Oracle Database Appliance at the heart of their new design.
Posted: 15 Jan 2018 | Published: 31 Dec 2016

Cintra

The Business Case for Mobile Security
sponsored by Lookout
EBOOK: Mobility is the way of the future, so you need to protect your mobile devices. This e-book chapter presents the case for mobile security and how you can convince the different decision-makers that mobile threats are real and worth the investment to defend against.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Lookout

Trusted Access For Painless Security
sponsored by Duo Security
RESOURCE: Learn how to help reduce risk of a data breach caused by compromised credentials, known vulnerabilities, or exploits and how to verify your users' identity up front through authentication.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Duo Security

The Architecture of a Container Intelligence Platform
sponsored by Sysdig
WHITE PAPER: Containers are changing the way we run software, and you need a unified approach for monitoring, security, and forensics in containerized & microservice environments. Read this white paper to learn how an intelligent container platform helps you achieve this, emboldening your container strategy.
Posted: 11 Jan 2018 | Published: 29 Nov 2017

Sysdig

Run Critical Databases in the Cloud
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This white paper explores the question of whether or not a public cloud is suitable place to house your key databases. Learn about the Oracle Database Cloud, and find out how you can leverage a secure database as a service (DBaaS) platform.
Posted: 10 Jan 2018 | Published: 31 Dec 2017

Oracle Corporation UK Ltd

Filling the Gaps in Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper provides information from an Osterman Research survey regarding users' experience with Office 365 in regard to security and protection.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

Proofpoint, Inc.

DevOps GDPR Compliance: The Condensed Edition
sponsored by Sysdig
DATA SHEET: This article focuses on GDPR from the DevOps perspective, covering the key points, including an overview of regulations, the key terminology you'll see, and what's most important to your team.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

Sysdig

Secure DevOps Survival Guide
sponsored by Veracode, Inc.
WHITE PAPER: DevOps is the most disruptive trend affecting secure development today. This resource provides you with the importance of securing DevOps and everything to know when adopting a DevOps approach.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

Veracode, Inc.

PCI DSS & Your Call Center: The Do's & Don'ts of Compliance
sponsored by Semafone
WEBCAST: According to the Ponemon Institute, on average security breaches cost $4 million annually. To prevent breaches and the large costs that come along with it, complying with policy regulations is important. This webinar provides insight into the importance of the PCI DSS regulation and offers approaches for becoming compliant.
Posted: 09 Jan 2018 | Premiered: Jan 9, 2018

Semafone

How Do You Know If Your Last Security Incident Is Fully Addressed?
sponsored by Tanium
RESOURCE: According to the Ponemon Institute's Cost of a Data Breach Study, it takes organizations an average of 191 days to detect a breach. Once you have dealt with a breach, how do you know it is fully addressed? This infographic reveals staggering statistics regarding cyberattacks, breach detection, and remediation.
Posted: 09 Jan 2018 | Published: 09 Jan 2018

Tanium

The Perils & Pitfalls of Pause & Resume Call Recording
sponsored by Semafone
WEBCAST: The average cost of a data breach has risen to $4 million, according to the Cost of a Data Breach Study: Global Analysis. Explore this webinar to gain insight into security within the payment card industry and uncover PCI DSS compliance regulation information.
Posted: 08 Jan 2018 | Premiered: Jan 8, 2018

Semafone

Improving Cybersecurity in the Contact Center: How to Prevent a Data Breach
sponsored by Semafone
WEBCAST: According to the Semafone's State of Data Security in Contact Centers Report, more than 40% of agents do not report data breach attempts. Take an in-depth look at this webinar to gain a better understanding of the payment card industry and how to advance your security to prevent data breaches from occurring.
Posted: 08 Jan 2018 | Premiered: Jan 8, 2018

Semafone

The Top 4 Myths of Network Security and Compliance
sponsored by FireMon
WHITE PAPER: Each year, fraudulent activity accounts for $600 billion in losses in the United States. Explore this resource to gain insight into policy regulations and how to secure your data while maintaining regulatory compliance.
Posted: 08 Jan 2018 | Published: 08 Jan 2018

FireMon

If You Think Compliance is Expensive, Try Violations
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: You don't need to be a victim of a cyberattack for your information systems to be on the wrong side of compliance regulations. Explore this white paper to discover how to prepare your sensitive data in the cloud for regulations such as GDPR, PCI DSS, and more.
Posted: 08 Jan 2018 | Published: 08 Jan 2018

Oracle Corporation UK Ltd

The State of Data Security in Contact Centers
sponsored by Semafone
WHITE PAPER: A concerning number of contact centers continue to rely on outdated, risky practices for customer interaction, data collection and fraud prevention, which can lead to damaging data breaches. This resource offers a deeper understanding into avoiding contact center security risks when collecting customer data.
Posted: 05 Jan 2018 | Published: 05 Jan 2018

Semafone

What is Password Management?
sponsored by Fast Pass Corp
WHITE PAPER: This paper explores the importance of enterprise password management, intended for IT-pros involved in the processes related to the use of corporate passwords.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Fast Pass Corp

Cybersecurity for Dummies
sponsored by Thycotic
WHITE PAPER: People are the number one target and cause of cybersecurity failures. Explore this 29-page For Dummies e-book to learn about cybersecurity, how to recognize and respond to threats, and how to protect your company.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Thycotic

Making the Case for a Cloud Access Security Broker (CASB)
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: According to Gartner, by 2020, 85% of large enterprises will use a cloud access security broker solution for their cloud services. This white paper offers insight into CASBs and reveals the cost considerations and benefits of implementing one.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Oracle Corporation UK Ltd

Mitigate the Top 9 Cloud Threats with a CASB
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: Today's enterprises run 41% of their workloads in a public cloud, and 38% in a private cloud, according to the 2017 State of the Cloud Survey. This white paper offers strategies for mitigating the top 9 cloud threats with a cloud access security broker (CASB).
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Oracle Corporation UK Ltd

The GDPR from a North American Perspective
sponsored by Sophos
WHITE PAPER: 54% of US Multinationals have the GDPR as the number 1 data protection priority, according to a 2017 PWC study. This white paper discusses how the GDPR will affect non-European companies and provides insights into what your company can do to prepare for the regulation.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Sophos

GDPR Compliance Checklist: A 9-Step Guide
sponsored by AlienVault
WHITE PAPER: The GDPR has the potential to significantly alter the way businesses handle and store data as it consolidates and replaces many local data protection laws. This guide offers a 9-step GDPR checklist to ensure your organization is prepared for the May 2018 regulation.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

AlienVault

The 7 Building Blocks of Better Threat Visibility
sponsored by RSA
WHITE PAPER: According to RSA, the anticipated losses to cybercrime by 2021 are $6 trillion. Explore this e-book to uncover how to advance your threat visibility with 7 building blocks.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

RSA
26 - 50 of 2554 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement