IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Disposal

RSS Feed   
Data Disposal White Papers (View All Report Types)
 
Taking Advantage of Multicore/Multiprocessor Technologies to Meet Today's Storage Needs
sponsored by Oracle India Pvt. Ltd
WHITE PAPER: This comprehensive white paper explores how Oracle's Sun ZFS Storage Appliances can perform complex processing for compression, deduplication, real-time storage analytics, and other advanced data services without slowing down I/O throughput and without costing more than competing solutions.
Posted: 17 May 2013 | Published: 24 Jun 2012

Oracle India Pvt. Ltd

California Consumer Privacy Act vs GDPR: What You Need to Know
sponsored by BigID
WHITE PAPER: The CCPA is the first of its kind law in the US that will put privacy rights in the hands of California consumers. It builds on many core principles that defined Europe’s GDPR, but there are some variations that are important to distinguish. In this white paper, explore the key differences and similarities between these 2 regulations.
Posted: 08 Jan 2020 | Published: 08 Jan 2020

BigID

Focusing application development and maintenance on delivering key business outcomes
sponsored by Capgemini
WHITE PAPER: To keep up with rapid digital transformation, application development and maintenance (ADM) needs to balance the needs of both IT and business teams. Read this exclusive TechTarget white paper to learn how ADMnext integrates business and IT to produce better outcomes for all.
Posted: 17 Dec 2019 | Published: 17 Dec 2019

Capgemini

Cyber Chief Magazine: 7th Edition
sponsored by Netwrix Corporation
WHITE PAPER: Even though there are numerous benefits for incorporating cloud capabilities, organizations remain hesitant – likely due to the perceived security deficiencies. This edition of Cyber Chief Magazine addresses this concern by looking at the various types of content stored in the cloud and proven security strategies for protecting that data.
Posted: 10 Jan 2020 | Published: 10 Jan 2020

Netwrix Corporation

How to Safeguard Against Cross-Site Scripting (XSS) Attacks
sponsored by Tala Security
WHITE PAPER: Cross-site scripting (XSS) attacks are a rising concern for all industries and will continue to be a favored strategy for cybercriminals. With a proactive and strategic approach, your organization can ensure web application security. Read on to learn more.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Tala Security

The ROI of Security Awareness Training
sponsored by Mimecast
WHITE PAPER: When it comes to developing a security strategy to protect your organization’s sensitive data, it’s critical to consider both the people within your environment as well as the technology. In this white paper, review the results of in-depth research recently conducted by Osterman Research and discover the need for security awareness programs.
Posted: 11 Dec 2019 | Published: 31 Aug 2019

Mimecast

The Cost of an Application Security Testing Program
sponsored by WhiteHat Security
WHITE PAPER: How can your organization decide if an application security testing program is worth the cost? This WhiteHat Security white paper breaks down all the costs involved in application security so your organization can stay secure – and on budget. Read the white paper now.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

WhiteHat Security

Quick Study: A Well-Defined Digital Transformation
sponsored by Hyland
WHITE PAPER: Gain access to a cheat-sheet to reference as you craft your organization’s digital transformation strategy for 2020 – and learn about the key technology choices you’ll need to know along the way.
Posted: 13 Jan 2020 | Published: 13 Jan 2020

Hyland

Connected Car Security
sponsored by Intertrust
WHITE PAPER: As connected cars grow in popularity due to their convenience, it’s important to note that the increasing number of smart features built into cars opens the network to serious vulnerabilities and threats. This white paper highlights the threats facing connected cars by examining common cyberattack patterns and how to protect against them.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

Intertrust

The Beginner’s Guide to Bug Bounty Programs
sponsored by HackerOne
WHITE PAPER: In The Beginners’ Guide to Bug Bounty Programs, discover how organizations including Starbucks, Airbnb, GitHub, Hyatt, Nintendo and Google Play are working with hackers to protect their customers and brands.
Posted: 10 Dec 2019 | Published: 10 Dec 2019

HackerOne
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info