IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
1 - 25 of 2726 Matches Previous Page  |  Next Page
Managing and Monitoring a Single View of Concentration Risk
sponsored by IBM
WHITE PAPER: This white paper exposes how to develop a risk management system that will satisfy regulators and create a competitive advantage for banks that's also proactive about data collection, monitoring and management.
Posted: 22 Jun 2018 | Published: 22 Jun 2018

IBM

IBM Watson Regulatory Compliance
sponsored by IBM
WHITE PAPER: Risk and compliance analysis has changed significantly, increasing the regulatory compliance demands placed on organizations and driving the need for a new approach. Dive into this white paper to learn how cognitive computing can help banks streamline operations and reduce regulatory compliance cost.
Posted: 22 Jun 2018 | Published: 22 Jun 2018

IBM

Europol and Security Leaders Declare War on Ransomware
sponsored by Barracuda
CASE STUDY: Spearheaded by Europol's European Cybercrime Center, among others, No More Ransom provides an online source of information about the latest ransomware variants, including decryption keys that have worked to retrieve files encrypted in previous attacks.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

Barracuda

Digital Workplace Study Reveals Tangible Benefits, but Organizations Must Prepare for Data Security Risks
sponsored by Aruba Networks
RESEARCH CONTENT: Learn about data security in the digital workplace and uncover research about how the future of work is changing.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

Aruba Networks

Protecting Your Network from Malware
sponsored by Akamai Technologies
WHITE PAPER: 67% of workers use their own devices at work, according to IDC, and it only takes one compromised device to unleash malware that cripples the network or facilitates data exfiltration. Secure your network from vicious malware and most importantly, your data.
Posted: 21 Jun 2018 | Published: 30 Apr 2018

Akamai Technologies

How To Succeed in Data Loss Prevention (DLP) Projects
sponsored by Docauthority
WHITE PAPER: Inside, find out how AI and document security, combined with your DLP project, can help you to significantly improve the coverage for the data protected.
Posted: 20 Jun 2018 | Published: 20 Jun 2018

Docauthority

Bringing Business Value to GRC
sponsored by IBM
WHITE PAPER: Compliance, risk and governance policies no longer have to merely serve as ways to ensure you avoid a costly incident or run afoul of regulations. Explore this white paper for information on intelligent compliance, risk and governance – and how to use it to find profitable, low-risk business opportunities.
Posted: 20 Jun 2018 | Published: 31 Oct 2016

IBM

Cybercrime by the Numbers
sponsored by Akamai Technologies
RESOURCE: It's likely not a matter of if, but when your company will fall prey to a targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in today's hyperconnected world.
Posted: 20 Jun 2018 | Published: 20 Jun 2018

Akamai Technologies

Adopt DNS Best Practices to Proactively Protect Against Malware
sponsored by Akamai Technologies
RESOURCE: The cyber threat landscape is dynamic and accelerating. The DNS is a vulnerability in many organizations' defenses that malicious actors are increasingly exploiting. Explore these DNS best practices that can aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Posted: 20 Jun 2018 | Published: 30 Sep 2017

Akamai Technologies

Cloud Deployments Demand Cloud Generation Firewalls
sponsored by Barracuda
RESOURCE: When you're building cloud environments, you need a security solution built for the cloud. Find out how cloud generation firewalls are engineered to support specific deployment models and use cases of today's cloud environments.
Posted: 20 Jun 2018 | Published: 20 Jun 2018

Barracuda

Microsoft Teams up with Equinix for Greater Cloud Data Security
sponsored by Equinix
RESOURCE: In this blog, find out why enterprises should consider a vendor-neutral HSM-as-a-Service and how it can provide key management, encryption and tokenization across multiple cloud platforms.
Posted: 19 Jun 2018 | Published: 13 Jun 2018

Equinix

C-Suite Perspectives: Trends in the Cyberattack Landscape, Security Threats and Business Impacts
sponsored by Radware
RESEARCH CONTENT: In this executive report, learn about global cybersecurity trends from research designed to help the security community better understand the cybersecurity landscape, emerging trends, levels of preparedness and resulting business impacts.
Posted: 18 Jun 2018 | Published: 18 Jun 2018

Radware

PCI DSS & Data Security for Contact Centers: Navigating the Regulatory Landscape
sponsored by Semafone
WEBCAST: With the onslaught of cyberattacks that have occurred this year, data security has never been a higher priority for organizations, especially for contact centers. Learn from 2 leaders in the data security field about top data security regulations, laws and standards affecting contact center governance, and more.
Posted: 18 Jun 2018 | Premiered: Jun 13, 2018

Semafone

HSM Reimagined: Cloud Ready Encryption, Key Management and Tokenization as a Service
sponsored by Equinix
RESOURCE: More data in multi-cloud environments present increased security challenges, including the inability to obtain total control of encryption keys and data, malicious attacks and more. Learn how HSM as a Service provides cloud-ready encryption, key management and much more to help you stay protected.
Posted: 18 Jun 2018 | Published: 18 Jun 2018

Equinix

New Data Regulations: Is Your Business Compliant?
sponsored by Brennan IT
WHITE PAPER: Businesses like yours are responsible for keeping up with new data protection requirements, at the risk of steep fines and worse. Stay informed – review the key takeaways and stipulations from the latest batch of data regulations including Australia's NDB and the EU's GDPR.
Posted: 18 Jun 2018 | Published: 18 Jun 2018

Brennan IT

Data Breaches can be Prevented
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover 8 steps that security professionals can take to prevent data breaches and create a unified security strategy across network, cloud, and mobile environments.
Posted: 15 Jun 2018 | Published: 15 Jun 2018

Check Point Software Technologies Ltd.

Protecting Engineering IP in the Age of Collaboration
sponsored by Vera
VIDEO: Did you know that sharing enterprise information can open up your IP to risk, theft or loss? Listen in on this webinar to learn how to protect valuable engineering IP in a highly collaborative environment.
Posted: 15 Jun 2018 | Premiered: 12 Jun 2018

Vera

GDPR & Online Proofing: An Inconvenient Truth
sponsored by Jumio
EBOOK: Companies around the world are busy implementing the necessary policies and procedures to ensure customer data is appropriately handled, in order to comply with GDPR. Keep reading to find out if your data processor is effectively managing and exceeding the standards laid out in GDPR.
Posted: 14 Jun 2018 | Published: 14 Jun 2018

Jumio

Integrating and Securing Hybrid IT
sponsored by Dimension Data
EBOOK: This e-book acknowledges the key security considerations for integrating and securing hybrid IT and discloses valuable insights from the NTT Security 2018 Global Threat Intelligence Report.
Posted: 14 Jun 2018 | Published: 14 Jun 2018

Dimension Data

The Complete Security Guide for Cloud-Based Businesses
sponsored by Vera
EBOOK: Unlock this 10-page complete security guide to learn how a data-centric security approach allows cloud-based enterprises to secure data through its entire life cycle, everywhere it travels, no matter who has it or where it is stored.
Posted: 13 Jun 2018 | Published: 13 Jun 2018

Vera

Could Your HRIS Have a Hidden Data Privacy Problem?
sponsored by Ascentis
RESOURCE: Now more than ever, protecting sensitive employee information should be on the minds of HR teams. Explore how new features from HCM providers can help you secure your workers' data.
Posted: 07 Jun 2018 | Published: 31 May 2018

Ascentis

Busting Financial Crime with Machine Learning
sponsored by TIBCO
WHITE PAPER: In this white paper, learn how machine learning can produce more efficient fraud protection through supervised and unsupervised learning algorithms, which reduce cases of fraud while also reducing time spent investigating fraud red flags.
Posted: 07 Jun 2018 | Published: 12 May 2017


How a Children's Hospital Found the Medicine for Endpoint Security
sponsored by Cylance
CASE STUDY: This case study explores how Phoenix Children's Hospital and its IT security team prevents malicious activity targeting their 5,000 endpoints before it can endanger sensitive patient and payment information and hospital operations.
Posted: 06 Jun 2018 | Published: 06 Jun 2018

Cylance

Advanced Endpoint Protection: Cylance Security Value Map
sponsored by Cylance
RESOURCE: In this report, find out how Cylance updated their product software and how the update impacted their security effectiveness score and protected agent value.
Posted: 06 Jun 2018 | Published: 06 Jun 2018

Cylance

3 GDPR Requirements That Will Have a Big Impact on Your Organization
sponsored by Plixer
RESOURCE: Inside, find out why you must be able to collect data about every conversation on the network and be able to quickly deliver reports and root cause by ensuring your organization is GDPR compliant.
Posted: 06 Jun 2018 | Published: 06 Jun 2018

1 - 25 of 2726 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement