IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
1 - 25 of 1798 Matches Previous Page  |  Next Page
DO YOU MEAN PRIVATE CLOUD WHEN YOU SAY DEDICATED SERVERS?
sponsored by Hyve Managed Hosting
EBOOK: Although difficult, the ability to effectively gather and categorize data has become critical to any modern digital transformation strategy. Download this e-book to learn about how to safeguard critical data, the differences between private clouds and dedicated servers, the importance of scalability, and more.
Posted: 06 Oct 2021 | Published: 06 Oct 2021

TOPICS:  Data Security
Hyve Managed Hosting

Sensitive data in Slack
sponsored by Metomic
WHITE PAPER: Although its ease-of-use and convenience are without question, Slack users cite a lack of visibility or control over sensitive data as a significant challenge. This white paper aims to address a few key considerations around data protection in Slack. Read on to get started.
Posted: 29 Sep 2021 | Published: 29 Sep 2021

TOPICS:  Data Security
Metomic

Continuous replication for mission-critical systems
sponsored by Dell Technologies and VMware
CASE STUDY: Rushmore Electric Power Cooperative’s old backup solution left 50% of their data unprotected and exceeded their 13-hour backup window, sometimes by days. To improve user experience, they wanted faster, comprehensive data protection. Read this case study to learn how they addressed these challenges.
Posted: 22 Sep 2021 | Published: 22 Sep 2021

TOPICS:  Data Security
Dell Technologies and VMware

Computer Weekly - 21 September 2021: The cities planning for ethical use of AI
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to tech leaders in Barcelona and London about a collaboration to ensure ethical use of AI in the era of smart cities. The UK government wants to reform data protection law – we assess the implications. And we examine the latest best practice in hybrid cloud. Read the issue now.
Posted: 21 Sep 2021 | Published: 21 Sep 2021

ComputerWeekly.com

Public Sector Guide: How to Remove IT from Public Records Requests
sponsored by Smarsh
WHITE PAPER: Government agencies are under increasing pressure to be more transparent when it comes to personal information – requiring them to maintain strong data integrity and respond quickly to public records requests. Access this guide to unlock valuable insight and practical tips to streamline your public records request process.
Posted: 20 Sep 2021 | Published: 20 Sep 2021

TOPICS:  Data Security
Smarsh

Spotlight on Emerging Ransomware Threats
sponsored by Commvault
EGUIDE: Giving into ransom demands may not only lead to more ransomware attacks, but also more sophisticated ones. Paying those demands has the potential to create a false sense of security, unintended consequences and future liabilities. Tap into this e-guide to learn about current & emerging threats, best practices, and the negation process.
Posted: 13 Sep 2021 | Published: 22 Sep 2021

TOPICS:  Data Security
Commvault

Computer Weekly - 7 September 2021: Highways England delivers a digital roadmap
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the CDIO of Highways England about her digital services and asset management plans. We also explore SIEM and SOAR security tools and we find out how McLaren Racing is using data analytics to build its cars more efficiently. Read the issue now.
Posted: 06 Sep 2021 | Published: 07 Sep 2021

ComputerWeekly.com

Market Guide for Data Loss Prevention
sponsored by Forcepoint
ANALYST REPORT: Inside this Gartner Market Guide to Data Loss Prevention (DLP), you’ll find a market analysis, emerging trends and strategic recommendations as they relate to DLP and other data security challenges. Read on to get started.
Posted: 13 Aug 2021 | Published: 13 Aug 2021

TOPICS:  Data Security
Forcepoint

SOLUTION BRIEF: COMFORTE DATA PROTECTION
sponsored by Comforte AG
PRODUCT OVERVIEW: Data is protection is the most important part of any modern cybersecurity and compliance strategy. Access this solution brief to learn how Comforte AG is helping organization protect their most critical and sensitive data.
Posted: 12 Aug 2021 | Published: 12 Aug 2021

TOPICS:  Data Security
Comforte AG

Data Access Governance - Supercharged With AI
sponsored by Concentric
WEBCAST: Data access governance is the relatively straightforward task of making sure that only the people who need to access sensitive business information can do so. Watch this video to learn more about the importance of data access governance and discover how you can identify, monitor, and protect sensitive business data with greater ease.
Posted: 09 Aug 2021 | Premiered: Aug 9, 2021

Concentric

Digital Transformation...or Data Exasperation?
sponsored by Concentric
WEBCAST: By aligning data governance with business outcomes and your company’s data culture, you can ensure you’re facilitating proper data access even as you secure critical data. Watch this webinar to learn how data discovery, governance, and protection can be augmented with tools like AI, allowing you to protect your data as you drive greater value.
Posted: 09 Aug 2021 | Premiered: Aug 9, 2021

Concentric

Computer Weekly - 10 August 2021: Real-time data analytics in action
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the emerging applications of real-time analytics and highlight the challenges for businesses to maximise the benefits. EU experts are calling for reform of US surveillance laws – we look at the issues. And we talk to the co-CEO of HR software giant Workday. Read the issue now.
Posted: 06 Aug 2021 | Published: 10 Aug 2021

ComputerWeekly.com

Data quality emerges from Covid-19 more critical than ever
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

Concentric AI Video Datasheet
sponsored by Concentric
VIDEO: Watch this short video to learn how Concentric’s Semantic Intelligence solution can help you better identify and secure unstructured data, whether it takes the form of a report, financial documents, spreadsheet, or something else.
Posted: 27 Jul 2021 | Premiered: 03 Apr 2020

Concentric

Semantic Intelligence™ Solution with Risk Distance™ Analysis
sponsored by Concentric
WHITE PAPER: Semantic Intelligence allows you to deploy deep learning solutions capable of discovering, categorizing, and securing both structured and unstructured data. Access this white paper to learn how Concentric Semantic Intelligence works across hybrid cloud environments in a variety of use cases to ensure data compliance and protection.
Posted: 23 Jul 2021 | Published: 23 Jul 2021

Concentric

Computer Weekly - 29 June 2021: Is the UK government planning to rewrite GDPR?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, a government taskforce on post-Brexit regulations has recommended changes to GDPR in the UK – we examine the implications. The NHS has launched a new data strategy - we look at what it means for your medical records. And we ask how to avoid the performance problems that affect private cloud. Read the issue now.
Posted: 25 Jun 2021 | Published: 29 Jun 2021

ComputerWeekly.com

Data Security Platform Solution Brief
sponsored by Comforte AG
RESOURCE: With Comforte SecurDPS platform, your organization can gain a unique and powerful perspective for planning privacy compliance, implementing cloud migrations, and then measuring your breach risks in a quantitative manner. Access this solution brief to learn more about the benefits of Comforte SecurDPS platform.
Posted: 07 Jun 2021 | Published: 07 Jun 2021

TOPICS:  Data Security
Comforte AG

Let's Talk About Data Security for Cloud & PII
sponsored by Comforte AG
WHITE PAPER: Comforte's data security platform secures all your sensitive data and information intended for applications using standard protocols, especially useful for aaS applications. Access this PDF to learn more about data-centric security and the benefits of Comforte's data security platform.
Posted: 04 Jun 2021 | Published: 04 Jun 2021

TOPICS:  Data Security
Comforte AG

Risk-Adaptive Data Protection Webcast
sponsored by Forcepoint
WEBCAST: Learn how Risk-Based DLP balances employee productivity with providing effective breach protection.
Posted: 03 Jun 2021 | Premiered: Jun 3, 2021

TOPICS:  Data Security
Forcepoint

Risk-Adaptive Data Protection: The Behavior-Based Approach
sponsored by Forcepoint
EBOOK: Learn how Risk-Adaptive DLP goes beyond traditional solutions to meet the needs of your expanded ecosystem.
Posted: 03 Jun 2021 | Published: 03 Jun 2021

TOPICS:  Data Security
Forcepoint

Computer Weekly - 1 June 2021: The technology that enabled Covid-19 genome sequencing success
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the scientists behind the UK's gene sequencing work during the coronavirus pandemic to find out how cloud and data analytics enabled their success. It's three years since GDPR entered into law – we assess its progress. And we examine low-code software development for a small business. Read the issue now.
Posted: 27 May 2021 | Published: 01 Jun 2021

ComputerWeekly.com

Computer Weekly - 25 May 2021: Making data an asset, not a threat
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the latest developments in the UK government's National Data Strategy and what it means for the economy. Our latest buyer's guide explains the emerging technologies around computational storage. And we look at the advances in customer experience management during the pandemic. Read the issue now.
Posted: 24 May 2021 | Published: 25 May 2021

ComputerWeekly.com

CPRA Compliance Creates Complications for IT Ops
sponsored by Thales
EBOOK: PH
Posted: 14 May 2021 | Published: 14 May 2021

TOPICS:  Data Security
Thales

Zero-trust Implementation Begins With Choosing an On-Ramp
sponsored by Thales
EBOOK: PH
Posted: 14 May 2021 | Published: 14 May 2021

TOPICS:  Data Security
Thales

Comparing Data Protection vs. Data Security vs. Data Privacy
sponsored by Thales
EBOOK: PH
Posted: 14 May 2021 | Published: 14 May 2021

TOPICS:  Data Security
Thales
1 - 25 of 1798 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences