IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
1 - 25 of 2554 Matches Previous Page  |  Next Page
5 Security Tips to Work on Personal Device
sponsored by Citrix
WHITE PAPER: Mobility and personal devices are defining factors of the future workforce. Read this report for five tips to help you secure your personal device at work and minimize risk for yourself and your business. You will also see how employees act differently when using personal versus work devices, the importance of updating devices, and more.
Posted: 22 Jan 2018 | Published: 16 Nov 2017

Citrix

How to Minimize the IAM Risks Associated with Third-Party Relationships
sponsored by Identity Automation
EBOOK: According to a Deloitte survey, 94.3% of companies are not confident in the tools used to manage third-party risk. Discovery a variety of ways to increase your IAM approach to mitigate the risks of third-party relationships.
Posted: 22 Jan 2018 | Published: 22 Jan 2018

Identity Automation

Don't Switch To Windows 10 Without An Endpoint Security Plan
sponsored by Thycotic
WHITE PAPER: According to the Thycotic 2017 BlackHat Report, 73% of hackers report that traditional anti-virus tools are irrelevant or obsolete, and don't adapt quickly enough to block emerging threats. This resource offers endpoint and application security strategies as well as tactics to enhance your Windows 7 and 10 security.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

Thycotic

What Keeps Me Up At Night?: Concerns of a CISO
sponsored by enSilo
WEBCAST: Watch this webcast to uncover a list of security concerns facing CISOs today as well as pre-infection protection strategies to lessen these concerns.
Posted: 19 Jan 2018 | Premiered: Jan 19, 2018


Mitigate the Top 9 Cloud Threats with a Cloud Access Security Broker (CASB)
sponsored by Oracle Corporation
WHITE PAPER: According to Cloud Computing Trends: 2017 State of the Cloud Survey, today's enterprises run 41% of their workloads in a public cloud, and 38% in a private cloud. This white paper offers strategies for mitigating the top 9 cloud threats with a cloud access security broker (CASB).
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Oracle Corporation

Making the Case for a Cloud Access Security Broker (CASB)
sponsored by Oracle Corporation
WHITE PAPER: CASBs are one of the fastest growing security technologies today. According to Gartner, by 2020, 85% of large enterprises will use a cloud access security broker for their cloud services. Explore this resource to learn about why CASBs are important for improving your cloud security.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Oracle Corporation

Enabling Healthcare with Trusted Access
sponsored by Duo Security
WEBCAST: Within the healthcare industry there is an immense amount of data that needs to be secured. Take a look at this webcast to learn more about the need for security improvement within the healthcare industry.
Posted: 18 Jan 2018 | Premiered: Jan 18, 2018

Duo Security

Two-Factor Authentication Evaluation Guide
sponsored by Duo Security
EBOOK: This e-book details a comprehensive set of criteria to customize your evaluation to your organization's security needs and how to determine your ROI when deploying your two-factor authentication tools.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Duo Security

Always on GDPR - The Visibility to Act Like the Pros
sponsored by Nuix
WHITE PAPER: The GDPR is estimated to implement $5.3 billion in fines by 2021, according to Nuix. To avoid the strict fines imposed by the regulation, a successful compliance strategy is critical. This resource offers an approach to effectively securing personal data through a more advanced method than your average cybersecurity strategy.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Nuix

Contingent Workers
sponsored by Identity Automation
WHITE PAPER: By 2020, approximately 40% of the average company's total workforce is expected to be contingent workers. The rise in contingent workers brings an insider security risk. Insiders are by far the weakest link in most organizations' security model. Take a look at this e-book and learn more about the threats insiders pose to your organization.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Identity Automation

The 2017 Trusted Access Report
sponsored by Duo Security
WHITE PAPER: The enterprise perimeter has been redefined by new networking models and with new technology, comes new security risks. Take a look at this 29-page report to learn about the evolution of enterprise security and overall device security health.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Duo Security

The Good Shepherd Model for Cybersecurity, Privacy, And Regulatory Compliance
sponsored by Nuix
WHITE PAPER: Data breaches are inevitable - If you can't prevent hackers or insiders from getting into your organization's network, it's vital to minimize the damage they can cause. This white paper reveals four rules for protecting private data to improve compliance with privacy regulations.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Nuix

Connected Intelligence: GDPR and Incident Response
sponsored by Nuix
WHITE PAPER: The GDPR will force organizations to reexamine how they handle consumers' personal information. Data breach investigations in just 72 hours —are you prepared? This white paper offers GDPR and incident response preparation strategies to ensure your enterprise is ready for the upcoming regulation.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Nuix

The Trouble with Phishing
sponsored by Duo Security
WHITE PAPER: Phishing is one of the most common threats hitting organizations and it is only getting worse. This guide offers insight into the problems around phishing, how it happens, and what your organization can do to defend against the damaging attacks.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Duo Security

How a Major Australian University Went Cloud-First with Backup and Disaster Recovery
sponsored by AWS-Netapp
CASE STUDY: Read on to find out how a major university, with five campuses around the world, was able to take a petabyte-scale tape-based backup and recovery process supporting tens of thousands of employees and students and move it quickly and securely to a public cloud-based solution with zero downtime.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

AWS-Netapp

Switch to the Cloud and Save with Integrated Backup and Recovery
sponsored by AWS-Netapp
EBOOK: Enterprises are increasingly choosing cloud integrated tools that deliver more secure, efficient backup and recovery alternatives to traditional on-premises solutions. This e-book explores three compelling reasons for moving backup and recovery to the cloud, and how you can securely make the transition with ease.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

AWS-Netapp

3 Types of Rogue Employees and How to Stop Them
sponsored by Identity Automation
WHITE PAPER: Employees pose the greatest threat to any organization and have the capability to cause egregious harm and costs through data breaches, insecure transactions, and cyber theft. This e-book reveals 3 types of employees who pose security risks and offers strategic approaches utilizing IAM for mitigating these risks and improving your security.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Identity Automation

A Practical Guide for GDPR Compliance
sponsored by Nuix
WHITE PAPER: Most organizations are not yet adequately prepared for compliance with the GDPR. In fact, 64% of organizations are not ready to comply with the requirements. This white paper offers a practical guide for GDPR compliance, including insight into why the GDPR is important and its essential requirements.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Nuix

The GDPR Playbook
sponsored by Proofpoint, Inc.
WHITE PAPER: Is your business, brand reputation, and bottom line worth preserving? In order to comply with the GDPR and avoid the harsh penalties, creating a plan with the new rules is critical for all organizations. This GDPR playbook provides a roadmap to compliance and 7 key principles to know before May 2018.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Proofpoint, Inc.

Stripping the Malware Threat Out of PowerShell
sponsored by enSilo
WHITE PAPER: This white paper provides insight into PowerShell and how it is being leeched onto by threat actors. In addition, learn how to protect your endpoints against this increasing threat.
Posted: 15 Jan 2018 | Published: 15 Jan 2018


Vulnerable By Design: Why Destructive Exploits Keep On Coming
sponsored by enSilo
WHITE PAPER: Attackers can exploit design vulnerabilities and gain root access to highly secure systems leading to data theft, disruption of critical infrastructure and more. Explore this resource to gain insight into design vulnerabilities and malware which exploit them. In addition uncover the differences between design and security vulnerabilities.
Posted: 15 Jan 2018 | Published: 15 Jan 2018


An Intelligent Response to Rising Threats
sponsored by AdvizeX Technologies
WHITE PAPER: This white paper offers an approach to enhancing your current SIEM approach to improve security and protect against ransomware and malware targeting your enterprise's data.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

AdvizeX Technologies

Implications of the Data Breach Notification Requirements in the GDPR
sponsored by Fortinet, Inc.
WHITE PAPER: Globally, cybercrime damages are expected to double by 2021, totaling $6 trillion, according to CSO. This resource offers insight into the data breach notification requirements of the GDPR and provides strategies for preparing your data for the regulation.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Fortinet, Inc.

Endpoint Security and HIPAA Compliance
sponsored by enSilo
WHITE PAPER: A common requirement in virtually all regulatory compliance objectives and defense in depth strategies is to provide endpoint protection against malware and zero-day threats. Read this white paper to uncover a strategic approach to endpoint security while maintaining HIPAA compliance.
Posted: 15 Jan 2018 | Published: 15 Jan 2018


Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: According to a recent Verizon study, 40% of confirmed data breaches resulted directly from web app attacks. Explore this white paper to uncover a 3-step guide to gaining a mature application security program to prevent falling victim to damaging data breaches.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Veracode, Inc.
1 - 25 of 2554 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement