IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security White Papers (View All Report Types)
76 - 100 of 1391 Matches Previous Page  |  Next Page
5 Considerations in Choosing a Collaboration Platform in the Digital Age
sponsored by Box
WHITE PAPER: In this custom e-book, 5 Considerations in Choosing a Collaboration Platform in the Digital Age, discover tips for selecting a collaboration platform that's suited to your organization's specific content needs.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Box

Does the GDPR Apply to You?
sponsored by Imperva
WHITE PAPER: Organizations which are not in compliance with the GDPR can expect very stiff financial penalties. This resource offers insight into which organizations the GDPR applies, key data security requirements of the regulation, non-compliance penalties and more.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Imperva

GDPR: The Penalties for Non-Compliance
sponsored by Imperva
WHITE PAPER: The GDPR gives data protection authorities more investigative and enforcement powers. This resource reveals the harsh penalties of not complying with the GDPR.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Imperva

Integrating Human and Technological Elements in your Security Strategy
sponsored by Kaspersky Lab
WHITE PAPER: Cybercrime damages are expected to cost the world $6 trillion by 2021, according to CSO. This resource offers strategies for protecting your business from the ever-changing threat landscape.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Kaspersky Lab

The Mystery of the APT
sponsored by Kaspersky Lab
WHITE PAPER: For companies that experiences a targeted attack, 68% report data loss or exposure as a direct result of the attack, according to a Kaspersky Lab study. This resource reveals insight into advanced persistent threats (APTs) and offers protection strategies to avoid falling victim to harmful attacks.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Kaspersky Lab

5 Ways Modern Malware Defeats Your Defenses
sponsored by Radware
WHITE PAPER: According to the Verizon DBIR, 51% of data breaches include the usage of malware, whether for initial breach, expansion within the network or heisting data. This resource reveals 5 common evasion techniques used by modern malware and how they conquer anti-malware defenses.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Radware

Top 5 Database Security Threats
sponsored by Imperva
WHITE PAPER: According to the Verizon DBIR, hackers are motivated by financial gain, espionage, ideology or grudge, and even fun. This white paper examines the top 5 database security threats and explains how risk-sensitive organizations must remain a step ahead in their security posture.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Imperva

Preparing Your Organization for the GDPR
sponsored by Imperva
WHITE PAPER: Where does your organization stand in terms of GDPR preparedness? Access this resource to uncover 5 questions to determine what GDPR means for your organization and how to prepare.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Imperva

Cloud Security: Making Sense of the Shared Responsibility Model
sponsored by Oracle Corporation
WHITE PAPER: For enterprises using cloud services, there's a lot of confusion surrounding the shared responsibility model, particularly with what security measures the enterprise must provide. This resource explores the root cause behind this confusion and offers examples of how enterprises are successfully addressing and embracing the model.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Oracle Corporation

Mitigate the top nine cloud threats with a cloud access security broker (CASB)
sponsored by Oracle Corporation
WHITE PAPER: Today's enterprises run 41% of their workloads in a public cloud, and 38% in a private cloud, according to the 2017 State of the Cloud Survey. This white paper offers strategies for mitigating the top 9 cloud threats with a cloud access security broker (CASB).
Posted: 19 Feb 2018 | Published: 19 Feb 2018

Oracle Corporation

Making the case for a cloud access security broker (CASB)
sponsored by Oracle Corporation
WHITE PAPER: CASBs are one of the fastest growing security technologies today. According to Gartner, by 2020, 85% of large enterprises will use a cloud access security broker for their cloud services. Explore this resource to learn about why CASBs are important for improving your cloud security and explore key cost considerations.
Posted: 19 Feb 2018 | Published: 19 Feb 2018

Oracle Corporation

Global De-Duplication for Encrypted Data
sponsored by Carbonite
WHITE PAPER: Global deduplication removes redundant data across the entire organization, not just individual systems. Download this white paper to uncover a global deduplication technology that is executed on encrypted data using unique encryption keys for each block of data, so businesses get the benefits of deduplication without sacrificing data security.
Posted: 19 Feb 2018 | Published: 19 Feb 2018

Carbonite

Threat Intelligence: Cybersecurity's Best Kept Secret
sponsored by CrowdStrike
WHITE PAPER: Since threat intelligence comes in many shapes and forms, misunderstandings about what cyber threat intelligence (CTI) entails is common. This resource offers 4 use cases on CTI and explains different categories of CTI and how it can be optimized within security teams.
Posted: 16 Feb 2018 | Published: 16 Feb 2018

CrowdStrike

8 Signs your ECM System is Past its Useful Life
sponsored by Nuxeo
WHITE PAPER: Discover 8 signs your enterprise content management (ECM) system is obsolete and find out how you can make sure your ECM strategy is up to the challenge of modern data volumes and security demands.
Posted: 16 Feb 2018 | Published: 31 Dec 2017


Five Essential Elements of Next-Gen Endpoint Protection
sponsored by CrowdStrike
WHITE PAPER: Many endpoint strategies are fixated on stopping malicious attacks, rather than seeking out indicators of attacks that can point to breach activity, even when malware isn't present. Key into this white paper to uncover 5 essential elements of next-generation endpoint protection.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

CrowdStrike

Getting Started With Attribute Based Access Control
sponsored by Axiomatics
WHITE PAPER: How are you protecting access to your most critical assets? Explore this white paper to gain insight into attribute based access control (ABAC) and uncover 3 major steps to deploying an effective program.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

Axiomatics

Security's Identity Crisis: Are You Overlooking The #1 Attack Vector?
sponsored by Centrify Corporation
WHITE PAPER: According to Gemalto's Breach Level Index Report, breaches were up 164% in 2017. This e-book explores security's identity crisis, helps you assess your current security approach, and offers a method to strengthen your company's identity controls.
Posted: 09 Feb 2018 | Published: 09 Feb 2018

Centrify Corporation

Preparing for Compliance with the GDPR
sponsored by Skybox Security
WHITE PAPER: The GDPR came about to help organizations prevent harmful data breaches. This whitepaper offers an overview of the GDPR and provides recommendations for technical compliance with 11 tangible steps.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Skybox Security

Demystifying IT Risk to Achieve Greater Security & Compliance
sponsored by Lynx Technology Partners
WHITE PAPER: Discover 4 steps to help you create effective risk management so that you can get a better picture of the threats facing your organization and improve your defense against them.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Lynx Technology Partners

Achieve Effective PCI Compliance by Automating Required Controls and Processes
sponsored by Skybox Security
WHITE PAPER: Find out how to improve PCI DSS compliance by incorporating a platform into your network and information security workflows that provides a holistic understanding of your attack surface.
Posted: 08 Feb 2018 | Published: 31 Dec 2016

Skybox Security

5 Fast Facts for API Access Control
sponsored by Axiomatics
WHITE PAPER: With user access oftentimes being instantaneous, it is difficult for administrators to control sensitive data. This resource outlines 5 key API access control facts as well as insight into how to address the challenges.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Axiomatics

Third-Party Risk Management for Financial Services
sponsored by BitSight
WHITE PAPER: Financial institutions are facing new, sophisticated, and highly dangerous threats from cybercriminals, including ransomware, DDoS attacks, fraud, and identity theft. This resource reveals helpful strategies for third-party risk management to help you protect sensitive data.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

BitSight

Making Risk Management More Effective With Security Ratings
sponsored by BitSight
WHITE PAPER: With the growth and sophistication of cyber threats and daily reports of security breaches, cyber risk is high on the list of most significant risks that organizations face. This resource offers 3 risk management approaches organizations have taken to effectively improve their security.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

BitSight

7 Critical Factors for an Optimized IAM Security Investment
sponsored by Edgile
WHITE PAPER: With security breaches dominating the headlines, CISOs find themselves fighting fires, rather than strategically planning. This resource offers a strategy-first approach allowing CISOs to build better long term investments and stay more secure.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Edgile

The Path to GDPR Compliance
sponsored by Digital Shadows
WHITE PAPER: In May 2018, GDPR comes into full force. But what does this regulation bring, and how do you prepare? This white paper outlines the 4 key steps towards GDPR compliance and 8 key changes to be aware of under GDPR.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Digital Shadows
76 - 100 of 1391 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement