IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security White Papers (View All Report Types)
1 - 25 of 1393 Matches Previous Page  |  Next Page
Busting Financial Crime with Machine Learning
sponsored by TIBCO
WHITE PAPER: In this white paper, learn how machine learning can produce more efficient fraud protection through supervised and unsupervised learning algorithms, which reduce cases of fraud while also reducing time spent investigating fraud red flags.
Posted: 23 Apr 2018 | Published: 12 May 2017


Identify, Govern and Protect Personal Data
sponsored by SAS
WHITE PAPER: A data breach could ruin your organization's reputation and negatively affect its bottom line. In this white paper, learn the 5-phase data protection cycle that could protect your organization's data – plus, additional best practices for protecting PII.
Posted: 23 Apr 2018 | Published: 31 Dec 2017

SAS

Anatomy of a Cyber Attack
sponsored by Oracle Corporation
WHITE PAPER: Security is everyone's job today, from consumers, to system administrators, to executives. Explore this resource to gain insight into the anatomy of a cyberattack, the lifecycle of a security breach and how to augment your current approach to protect your sensitive data.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

Oracle Corporation

A Look Into the Global "Drive-by Cryptocurrency Mining" Phenomenon
sponsored by Tech Data - MalwareBytes
WHITE PAPER: Cryptocurrencies were bound to trigger the interest of criminals and it wasn't long before coin mining malware made an appearance. Explore this resource to gain insight into the phenomenon known as "drive-by cryptocurrency mining".
Posted: 20 Apr 2018 | Published: 20 Apr 2018

Tech Data - MalwareBytes

Crypto-Agility: Security Without Compromise
sponsored by Gemalto
WHITE PAPER: Cryptographic protocols and algorithms evolve over time to counter new security threats. This resource explores Gemalto's encryption strategy, which can help you gain certified high-assurance network security, maximum network and application performance, and more.
Posted: 20 Apr 2018 | Published: 18 Apr 2018

Gemalto

Using Blockchain-Based Rewards to Combat Ocean Plastic
sponsored by IBM
WHITE PAPER: It's estimated that the equivalent of one garbage truck full of plastic waste enters the oceans every minute. Learn how one company saw this as an opportunity, and discover what technology they turned to make sure their global transactions run safely and securely.
Posted: 19 Apr 2018 | Published: 30 Sep 2017

IBM

Shining a Light on File Sharing and Shadow IT
sponsored by Citrix
WHITE PAPER: Learn 5 reasons why a business-grade file sharing platform can help enable employees to collaborate and access information while maintaining sound data security.
Posted: 18 Apr 2018 | Published: 18 Apr 2018

Citrix

Are Security Threats Keeping You Up at Night?
sponsored by Citrix
WHITE PAPER: Discover 5 steps to secure file sharing, designed to help you maintain compliance and data security without restricting access to information.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

Citrix

7 Must-Haves for Secure File Sharing
sponsored by Citrix
WHITE PAPER: This white paper explores how to select an IT-approved secure file-sharing service so that you can enable users to access and share the data they need. Discover 7 non-negotiable considerations for your file-sharing platform.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

Citrix

Securing Cloud Infrastructure and Applications with a SOC-as-a-Service
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: As cyberattacks grow more common, and bad actors increasingly exploit the cloud, IT professionals need robust cloud security strategies to protect their company. This white paper explores how the hybrid architecture of modern business increases exposure to all major types of cyberattacks.
Posted: 16 Apr 2018 | Published: 16 Apr 2018

Arctic Wolf Networks, Inc.

Tips and Tricks for Deploying Next-Generation Cybersecurity Using Micro-Segmentation
sponsored by VMware
WHITE PAPER: According to the Ponemon Institute, 89% of organizations have experienced a data breach. Take a look at this resource to uncover a strategy for rethinking your security strategy to meet next-generation security challenges by utilizing micro-segmentation.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

VMware

4 Opportunities to Create a Strategic Cybersecurity Advantage
sponsored by Nuix
WHITE PAPER: Cybersecurity breaches are a pandemic weakness exposing the whole world. Let's face it, they're going to happen. Take a look at this resource to uncover 4 opportunities to create a strategic cybersecurity advantage.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

Nuix

The Black Report 2018 - Decoding the Minds of Hackers
sponsored by Nuix
WHITE PAPER: According to the 2018 Black Report, 34% of respondents have been hacking for more than 10 years. Take a look at this report to learn more about the hackers targeting your enterprise.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

Nuix

Driving Innovation with GDPR
sponsored by DXC
WHITE PAPER: GDPR is a compliance challenge. Given the digital, complex and fast-evolving nature of its subject, it's also inherently a technology challenge. Explore this resource to learn about driving innovation with GDPR.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

DXC

How to Respond to the 2018 Threat Landscape
sponsored by VMware
WHITE PAPER: By 2020, 1/3 of successful attacks experienced by enterprises will be on data located in shadow IT resources, including shadow IoT. Explore this Gartner report to gain insight into responding to the 2018 threat landscape.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

VMware

GDPR and the Retail Sector
sponsored by DXC
WHITE PAPER: With more reported data breaches in the retail sector than any other, the advent of GDPR means retailers need to keep the positive focus on data as an asset, rather than a burden. Take a look at this resource to learn how GDPR is impacting the retail sector.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

DXC

Defining the Data Protection Officer
sponsored by DXC
WHITE PAPER: The International Association of Privacy Professionals estimates that GDPR will mean the advent of 75,000 new Data Protection Officers (DPOs). Explore this resource to gain insight into defining the DPO and their role.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

DXC

Turning Data Into Answers: A Collection of Security Customer Stories
sponsored by Splunk
WHITE PAPER: Businesses today produce an incredible amount of data during their everyday operations. In this resource, learn how a wide variety of organizations, ranging from healthcare providers to universities, are harnessing machine data to deliver better products, enhanced customer experience, and gain increased data security.
Posted: 11 Apr 2018 | Published: 31 Dec 2017

Splunk

Breach Reporting – A Technology Challenge
sponsored by DXC
WHITE PAPER: There was more data lost or stolen in the first half of 2017 than the whole of 2016, according to Gemalto's Breach Level Index. Take a look at this resource to learn about the challenge of data breach reporting and how GDPR is going to impact this.
Posted: 10 Apr 2018 | Published: 10 Apr 2018

DXC

GDPR and the Healthcare Industry
sponsored by DXC
WHITE PAPER: GDPR is about giving people control over how their personal data is processed, reducing risk and enabling people to build trust in the companies they interact with. Access this resource to learn how GDPR's implications are affecting the healthcare sector.
Posted: 10 Apr 2018 | Published: 10 Apr 2018

DXC

Individual's Rights Under GDPR
sponsored by DXC
WHITE PAPER: Some of the rights as stated in the GDPR are updates or extensions to legislation that already exists, while some are brand new. Take a look at this resource to uncover the 8 data protection rights for individuals as stipulated in GDPR.
Posted: 10 Apr 2018 | Published: 10 Apr 2018

DXC

The Motivations for GDPR: Individuals
sponsored by DXC
WHITE PAPER: The purpose behind GDPR is to make it easier for individuals to confirm who has their data, understand how their data is being used and raise any complaints about use or misuse of said data. Explore this resource to gain insight into the motivations for GDPR.
Posted: 10 Apr 2018 | Published: 10 Apr 2018

DXC

GDPR and the Banking Industry
sponsored by DXC
WHITE PAPER: GDPR will give companies across all sectors plenty to think about, but at heart it's about deserving the trust that your customers place in you. The GDPR is an opportunity for banks to step up and reinforce this trust. Access this resource to learn about GDPR's impact on the banking industry.
Posted: 09 Apr 2018 | Published: 09 Apr 2018

DXC

GDPR and the Insurance Industry
sponsored by DXC
WHITE PAPER: The insurance industry is one of the biggest crunchers of big data and analytics numbers, making GDPR's impact enormous. Access this resource to learn the ways in which GDPR is impacting the insurance industry.
Posted: 09 Apr 2018 | Published: 09 Apr 2018

DXC

How to Create a Scalable & Sustainable Vendor Risk Management Program
sponsored by BitSight
WHITE PAPER: Massive cyberattacks are routinely attributed to vendors with substandard security practices. This resource offers a detailed 6-step guide for creating a sustainable and scalable vendor risk management program from the ground up.
Posted: 09 Apr 2018 | Published: 09 Apr 2018

BitSight
1 - 25 of 1393 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement