IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security White Papers (View All Report Types)
1 - 25 of 818 Matches Previous Page  |  Next Page
IDC Worldwide Cloud Security Market Shares, 2018: Protecting Workloads in Hybrid and Multicloud
sponsored by Trend Micro
WHITE PAPER: SDC workload security spans threat protection, vulnerability management, analytics, and data integrity to protect what runs on top of the SDC infrastructure. This research report offers advice for technology suppliers and highlights the global market share. Read on to uncover the results.
Posted: 24 Jan 2020 | Published: 30 Nov 2019

Trend Micro

Interview with Identity Expert
sponsored by Mitek Systems, Inc.
WHITE PAPER: In this Q and A, the head of risk and payments at an American money transfer company sits down with the customer success leader at Mitek to talk about role of identity verification in innovation and how increasing regulations will affect financial institutions. Read on to learn more.
Posted: 23 Jan 2020 | Published: 21 Jan 2020


Protecting Intellectual Property: Black, White, and Shades of Gray
sponsored by InteliSecure
WHITE PAPER: Complying with data privacy regulations is important, but rarely is regulated data the only data worth protecting. Losses associated with regulatory fines present far less risk than the potential losses associated with intellectual property theft. In this white paper, learn how a data protection program can help you protect even unstructured IP.
Posted: 21 Jan 2020 | Published: 21 Jan 2020

InteliSecure

Cost Efficient Backups for the Enterprise
sponsored by Druva
WHITE PAPER: Access this white paper for a rundown of the pros and cons of each type of deduplication and to view a solution that unifies data protection with global dedupe to break up operational silos and simplify administration.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

Druva

Gain Situational Awareness to Improve Critical Event Management
sponsored by EverBridge Inc.
WHITE PAPER: Access this white paper to learn several techniques to improve your organization’s critical event management (CEM) like the OODA loop, data collection, and the 4 steps to resolving crises.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

EverBridge Inc.

ZeroNorth 2019 End of Year Report
sponsored by ZeroNorth
WHITE PAPER: 2019 has been a formative year in cybersecurity – growing security risks and compliance regulations put pressure on organizations to rethink their current strategy. This annual report highlights key statistics to show where the security landscape is trending to help you position yourself for success in 2020.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

ZeroNorth

Enterprise Family Guide
sponsored by TechData - Seagate
WHITE PAPER: Access this white paper to learn about a family of vertically integrated Enterprise Data Solutions from Seagate, including the Exos Enterprise Hard Drives and the Nytro Enterprise Solid-State Drives, that are fit to accommodate zettabyte-level data capacity and performance.
Posted: 10 Jan 2020 | Published: 10 Jan 2020

TechData - Seagate

GDPR Perspectives: Rethinking Data Discovery for Privacy and GDPR
sponsored by BigID
WHITE PAPER: With data privacy laws like GDPR regulating the way organizations manage data, it’s grown increasingly critical for organizations to take a strategic approach to the way they collect, process, and categorize data. Read this white paper to learn about the rising popularity of data classification solutions and other discover tools.
Posted: 10 Jan 2020 | Published: 10 Jan 2020

BigID

Cyber Chief Magazine: 7th Edition
sponsored by Netwrix Corporation
WHITE PAPER: Even though there are numerous benefits for incorporating cloud capabilities, organizations remain hesitant – likely due to the perceived security deficiencies. This edition of Cyber Chief Magazine addresses this concern by looking at the various types of content stored in the cloud and proven security strategies for protecting that data.
Posted: 10 Jan 2020 | Published: 10 Jan 2020

Netwrix Corporation

A Buyer’s Guide to Automating Personal Data Rights for CCPA and GDPR
sponsored by BigID
WHITE PAPER: With the arrival of data rights and privacy regulations, organizations face increasing pressure to maintain strategies that ensure data protection. The risks for failing to do so include financial, legal and reputational damage. Read this buyer’s guide to ensure your organization informed on the key aspects of data discovery.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

BigID

California Consumer Privacy Act vs GDPR: What You Need to Know
sponsored by BigID
WHITE PAPER: The CCPA is the first of its kind law in the US that will put privacy rights in the hands of California consumers. It builds on many core principles that defined Europe’s GDPR, but there are some variations that are important to distinguish. In this white paper, explore the key differences and similarities between these 2 regulations.
Posted: 08 Jan 2020 | Published: 08 Jan 2020

BigID

4 Steps to Building a PII Catalog for Privacy
sponsored by BigID
WHITE PAPER: Data catalogs digest an input of data in order to accurately organize what it is and where it comes from. Effective catalogs enable organizations to automate policy, implement data security and maintain compliance. This white paper highlights a 4-step process designed to guide an organization in its catalog journey. Read on to learn more.
Posted: 08 Jan 2020 | Published: 08 Jan 2020

BigID

A Buyer’s Guide to Privacy-Centric Data Discovery
sponsored by BigID
WHITE PAPER: Protecting customer data has never been easy. And with the introduction of regulations like GDPR and CCPA, organizations face heavy penalties for failing to address this issue. Use this buyer’s guide to stay informed on the key components to look for in data discovery partner.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

BigID

CCPA Readiness Checklist
sponsored by BigID
WHITE PAPER: As of January 1, 2020, the CCPA has come into effect. Given the steep penalties for failing to comply, organizations should make certain that they’re positioned to responsibly safeguard customer data. Use this comprehensive checklist to ensure your organization meets the requirements of California’s new data privacy regulation.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

BigID

Next-Generation Data Classification
sponsored by BigID
WHITE PAPER: Traditional approaches to data classification relied on manual entries, which fail to meet the scalability needs of today’s ever-expanding environments. In this white paper, discover BigID’s next-generation data classification approach, which builds on the success of its predecessors with sustainability and privacy at its core.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

BigID

Digital Identity Security Assurance: How to Keep Your Customer Data Secure
sponsored by Akamai Technologies
WHITE PAPER: Customer identities are among the most critical and valuable assets of any organization. Failing to provide adequate security can result in financial, reputational, and even legal consequences. This paper highlights industry best practices for building customer trust through comprehensive security programs. Read on to learn more.
Posted: 23 Dec 2019 | Published: 30 Nov 2019

Akamai Technologies

Putting Cybercrime in Perspective
sponsored by InteliSecure
WHITE PAPER: When it comes to cybercrime, it can difficult to separate hype from the truth. This white paper puts these threats into perspective to help you to understand your organization’s risk appetite, the cost of data loss and the steps your organization needs to take to reduce cybercrime impact.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

InteliSecure

Key Steps in Satisfying Your CCPA and Other Privacy Obligations
sponsored by PerimeterX
WHITE PAPER: In order to avoid the severe financial, legal and reputational penalties that can apply to companies fail to meet regulations, organizations need to ensure that their data protection strategy is fine-tuned for 2020. In this Osterman Research report, uncover key steps your organization needs to take to prepare for the CCPA.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

PerimeterX

California Consumer Privacy Act: The Need for Data-Centric Security
sponsored by Comforte AG
WHITE PAPER: CCPA is one of the latest in a series of new privacy regulations globe that affects businesses and comes with significant penalties. This whitepaper outlines the key steps necessary to prepare for CCPA and highlights the importance of data-centric security to ensure your organization is adequately prepared for 2020.
Posted: 13 Dec 2019 | Published: 30 Nov 2019

Comforte AG

The Cybersecurity Guide: Defending from Threats and Preventing Hacks
sponsored by A-Lign
WHITE PAPER: Organizations in every industry and at every size are vulnerable to data breaches or breach incidents. This cybersecurity guide exposes the threats that your organization could be vulnerable to and outlines threat prevention tactics in order to fortify your organization.
Posted: 12 Dec 2019 | Published: 12 Dec 2019

A-Lign

Preparing for a Data Breach: Not If, But When
sponsored by A-Lign
WHITE PAPER: When it comes to preparing for data breaches, companies should think in terms of “when” instead of “if” to ensure cybersecurity preparedness. In this white paper, Petar Besalev, Senior VP of Cybersecurity and Privacy Services at A-Lign, provides an overview of strategies and best-practices to help you prepare for a data breach.
Posted: 11 Dec 2019 | Published: 11 Dec 2019

A-Lign

5G, AI, Deepfakes and Beyond: The Future of IT and Security
sponsored by Splunk
WHITE PAPER: The past few years has seen the emergence of several innovative technologies and increased sophistication of attacks – both of which shape the way business is done. In this report, explore the cybersecurity trends and threats to keep in mind for 2020 and beyond.
Posted: 10 Dec 2019 | Published: 10 Dec 2019

Splunk

The Million-Dollar Opportunity: Compliance for Cyber Liability Insurance
sponsored by RapidFire
WHITE PAPER: To get an edge on securing clients against risking both security and payouts, read this white paper. It outlines the benefits of MSPs investing in compliance solutions to both protect their customers and grow their revenue, as well as 5 ways to help customers stay compliant.
Posted: 03 Dec 2019 | Published: 03 Dec 2019

RapidFire

4 Ways to Improve Customer Experience with a Modern Identity Service
sponsored by Okta
WHITE PAPER: In order to unify the customer experience and drive engagement, there needs to be an identity layer serving as the connective tissue between apps, devices, channels, and experiences. In this white paper, learn how Okta’s modern identity services can help organizations improve their customer experience.
Posted: 20 Nov 2019 | Published: 20 Nov 2019

Okta

Modern Data Management and Protection Pave the Path to Digital Transformation
sponsored by Veeam Software
WHITE PAPER: This paper reveals a backup approach that not only gives your organization the flexibility to deploy and protect apps across physical, virtual, and cloud platforms; it also provides analytics and DevOps workloads with the real-time data access they demand. To take advantage of this approach, read on.
Posted: 18 Nov 2019 | Published: 31 Dec 2018

Veeam Software
1 - 25 of 818 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info