IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security White Papers (View All Report Types)
101 - 125 of 1393 Matches Previous Page  |  Next Page
7 Critical Factors for an Optimized IAM Security Investment
sponsored by Edgile
WHITE PAPER: With security breaches dominating the headlines, CISOs find themselves fighting fires, rather than strategically planning. This resource offers a strategy-first approach allowing CISOs to build better long term investments and stay more secure.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Edgile

AHV: A Virtualization Solution for the Enterprise Cloud
sponsored by Nutanix
WHITE PAPER: This white paper tells you how to evaluate a virtualization tool and hypervisor along the same common criteria as any potential IT infrastructure investment. See this evaluation process put into practice on a hyperconverged infrastructure platform that is pioneering the movement toward a cloud-like consumption model for the enterprise datacenter.
Posted: 01 Feb 2018 | Published: 28 Dec 2016

Nutanix

5 Keys to Secure Information Management
sponsored by OnBase by Hyland
WHITE PAPER: With so much confidential data passing through today's business systems, information management must stand up to a higher degree of scrutiny when it comes to data security. Download the white paper to learn the 5 keys that will help you secure information management and reduce risks to your organization.
Posted: 31 Jan 2018 | Published: 31 Dec 2017

OnBase by Hyland

Why You Should Take Security in the Cloud
sponsored by Splunk
WHITE PAPER: Advanced security threats and attacks are getting harder to detect as hackers are becoming more sophisticated. Access this white paper to learn how the cloud can provide improved security benefits to your organization with a real-time view into advanced attacks and threat actors.
Posted: 30 Jan 2018 | Published: 30 Jan 2018

Splunk

Taming the GDPR
sponsored by Citrix
WHITE PAPER: Preparing for the GDPR requires organizations to understand the regulation, develop best practices for success and avoid common pitfalls. Leverage this resource to help you fully understand the GDPR and uncover strategies for tackling the regulation head-first.
Posted: 30 Jan 2018 | Published: 30 Jan 2018

Citrix

Ransomware 101: 3 Keys Ways to Get Started Combating Ransomware
sponsored by Splunk
WHITE PAPER: Ransomware was recently declared the number 2 most dangerous online threat to consumers and organizations, according to Europol. This white paper offers insight into complex, growing ransomware attacks and reveals 3 tangible steps to combatting ransomware within your organization.
Posted: 29 Jan 2018 | Published: 29 Jan 2018

Splunk

Maintaining Business Continuity & Security for Your Organization
sponsored by Citrix
WHITE PAPER: Whether planned or unplanned, business disruptions that aren't managed effectively come at a high cost. This white paper offers strategies for keeping your company productive during unplanned security incidents.
Posted: 29 Jan 2018 | Published: 29 Jan 2018

Citrix

Cybersecurity in Business Operations
sponsored by Virginia Tech Online
WHITE PAPER: Recent security breaches have made clear the fact that guarding the infrastructure is not only the responsibility of the IT desk. All users, from entry-level personnel to the C-suite, must help protect the integrity of their data assets.
Posted: 24 Jan 2018 | Published: 24 Jan 2018

Virginia Tech Online

SyncDog Metropolitan Police Department Case Study
sponsored by SyncDog
WHITE PAPER: In this case study, find out how a large metro police department faced dramatic improvements of workflow and compliance for handling of crime-scene data.
Posted: 24 Jan 2018 | Published: 28 Sep 2017

SyncDog

State-Of-The-Art Data Protection for GDPR
sponsored by Fortinet, Inc.
WHITE PAPER: According to the Center for Internet Security, most successful attacks exploit poor cyber hygiene. In order to comply with the GDPR and prevent cyberattacks, a data protection, advanced threat prevention and detection plan is necessary. This resource offers successful data breach prevention strategies to ensure GDPR preparation.
Posted: 23 Jan 2018 | Published: 23 Jan 2018

Fortinet, Inc.

Always on GDPR - The Visibility to Act Like the Pros
sponsored by Nuix
WHITE PAPER: The GDPR is estimated to implement $5.3 billion in fines by 2021, according to Nuix. To avoid the strict fines imposed by the regulation, a successful compliance strategy is critical. This resource offers an approach to effectively securing personal data through a more advanced method than your average cybersecurity strategy.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Nuix

Contingent Workers
sponsored by Identity Automation
WHITE PAPER: By 2020, approximately 40% of the average company's total workforce is expected to be contingent workers. The rise in contingent workers brings an insider security risk. Insiders are by far the weakest link in most organizations' security model. Take a look at this e-book and learn more about the threats insiders pose to your organization.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Identity Automation

The 2017 Trusted Access Report
sponsored by Duo Security
WHITE PAPER: The enterprise perimeter has been redefined by new networking models and with new technology, comes new security risks. Take a look at this 29-page report to learn about the evolution of enterprise security and overall device security health.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Duo Security

The Good Shepherd Model for Cybersecurity, Privacy, And Regulatory Compliance
sponsored by Nuix
WHITE PAPER: Data breaches are inevitable - If you can't prevent hackers or insiders from getting into your organization's network, it's vital to minimize the damage they can cause. This white paper reveals four rules for protecting private data to improve compliance with privacy regulations.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Nuix

Connected Intelligence: GDPR and Incident Response
sponsored by Nuix
WHITE PAPER: The GDPR will force organizations to reexamine how they handle consumers' personal information. Data breach investigations in just 72 hours —are you prepared? This white paper offers GDPR and incident response preparation strategies to ensure your enterprise is ready for the upcoming regulation.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Nuix

The Trouble with Phishing
sponsored by Duo Security
WHITE PAPER: Phishing is one of the most common threats hitting organizations and it is only getting worse. This guide offers insight into the problems around phishing, how it happens, and what your organization can do to defend against the damaging attacks.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Duo Security

3 Types of Rogue Employees and How to Stop Them
sponsored by Identity Automation
WHITE PAPER: Employees pose the greatest threat to any organization and have the capability to cause egregious harm and costs through data breaches, insecure transactions, and cyber theft. This e-book reveals 3 types of employees who pose security risks and offers strategic approaches utilizing IAM for mitigating these risks and improving your security.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Identity Automation

A Practical Guide for GDPR Compliance
sponsored by Nuix
WHITE PAPER: Most organizations are not yet adequately prepared for compliance with the GDPR. In fact, 64% of organizations are not ready to comply with the requirements. This white paper offers a practical guide for GDPR compliance, including insight into why the GDPR is important and its essential requirements.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Nuix

Stripping the Malware Threat Out of PowerShell
sponsored by enSilo
WHITE PAPER: This white paper provides insight into PowerShell and how it is being leeched onto by threat actors. In addition, learn how to protect your endpoints against this increasing threat.
Posted: 15 Jan 2018 | Published: 15 Jan 2018


Vulnerable By Design: Why Destructive Exploits Keep on Coming
sponsored by enSilo
WHITE PAPER: Attackers can exploit design vulnerabilities and gain root access to highly secure systems leading to data theft, disruption of critical infrastructure and more. Explore this resource to gain insight into design vulnerabilities and malware which exploit them. In addition, uncover the differences between design and typical security vulnerabilities.
Posted: 15 Jan 2018 | Published: 15 Jan 2018


An Intelligent Response to Rising Threats
sponsored by AdvizeX Technologies
WHITE PAPER: This white paper offers an approach to enhancing your current SIEM approach to improve security and protect against ransomware and malware targeting your enterprise's data.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

AdvizeX Technologies

Implications of the Data Breach Notification Requirements in the GDPR
sponsored by Fortinet, Inc.
WHITE PAPER: Globally, cybercrime damages are expected to double by 2021, totaling $6 trillion, according to CSO. This resource offers insight into the data breach notification requirements of the GDPR and provides strategies for preparing your data for the regulation.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Fortinet, Inc.

Endpoint Security and HIPAA Compliance
sponsored by enSilo
WHITE PAPER: A common requirement in virtually all regulatory compliance objectives and defense in depth strategies is to provide endpoint protection against malware and zero-day threats. Read this white paper to uncover a strategic approach to endpoint security while maintaining HIPAA compliance.
Posted: 15 Jan 2018 | Published: 15 Jan 2018


4 Essential Strategies for Endpoint Security and Protection
sponsored by Absolute
WHITE PAPER: Endpoint devices are the single largest group of devices inside your network today. Disruption of endpoints can have a serious impact on your day to day business operations. This resource offers 4 essential strategies to improve your endpoint security and protection.
Posted: 30 Jan 2018 | Published: 30 Jan 2018

Absolute

Don't Switch To Windows 10 Without An Endpoint Security Plan
sponsored by Thycotic
WHITE PAPER: According to the Thycotic 2017 BlackHat Report, 73% of hackers report that traditional anti-virus tools are irrelevant or obsolete, and don't adapt quickly enough to block emerging threats. This resource offers endpoint and application security strategies as well as tactics to enhance your Windows 7 and 10 security.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

Thycotic
101 - 125 of 1393 Matches Previous Page    3 4 5 6 7 8    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement