IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
1 - 25 of 1707 Matches Previous Page  |  Next Page
In data privacy we trust: building a strong information protection strategy in the hybrid era
sponsored by ComputerWeekly.com
EBOOK: In this e-guide, find out what it takes to build up a strong data privacy practice in your organisation, the differences between data protection and data privacy, as well as how cyber security and privacy teams can work together to better protect data from prying eyes.
Posted: 25 Jan 2022 | Published: 25 Jan 2022

ComputerWeekly.com

Infographic: Top IT predictions in APAC in 2022
sponsored by ComputerWeekly.com
INFOGRAPHIC: As one of the first in the world to emerge from the throes of the pandemic, Asia-Pacific (APAC) organisations are expected to invest more in cyber security, cloud computing and automation in 2022 to secure their digital future. In this infographic, we review some of the key IT trends that are likely to shape the industry in the next months.
Posted: 19 Jan 2022 | Published: 19 Jan 2022

ComputerWeekly.com

Infographic: Comparing data protection vs. data security vs. data privacy
sponsored by ComputerWeekly.com
INFOGRAPHIC: An organization's data is one of its most valuable assets and must be protected accordingly. Because there are so many ways data can potentially be compromised, organizations must take a multifaceted approach to ensure the well-being of their data. This means focusing on three key areas: data protection, data security and data privacy.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

ComputerWeekly.com

MicroScope – January 2022: Squaring up to ransomware
sponsored by MicroScope
EZINE: In this issue, discover how to best fend off the ever-increasing threat of ransomware, learn what the next stage of the data warehouse could be, and find out what leading channel experts believe awaits the industry in the year ahead
Posted: 06 Jan 2022 | Published: 07 Jan 2022

MicroScope

Computer Weekly - 14 December 2021: The rules for a safer internet
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now.
Posted: 12 Dec 2021 | Published: 14 Dec 2021

ComputerWeekly.com

CW APAC, December 2021: Expert guide to cloud migration
sponsored by ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at the key considerations and strategies that enterprises can take when moving their workloads to public cloud
Posted: 09 Dec 2021 | Published: 09 Dec 2021

ComputerWeekly.com

How to Achieve Zero Trust Data Protection in the Cloud
sponsored by Okta
WEBCAST: IDC predicts that the global datasphere will grow from 57 Zettabytes (ZB) in 2020 to 175 ZB by 2025 – how can today’s organizations hope to manage and protect this massive amount of data? Watch this webinar to learn how Zero Trust can provide secure, scalable data protection.
Posted: 05 Nov 2021 | Premiered: Nov 5, 2021

TOPICS:  Data Security
Okta

Computer Weekly - 2 November 2021: What the Budget means for UK technology
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look through the chancellor's Autumn Budget and Spending Review to find what it means for the UK tech sector. As COP26 starts, we assess the green credentials of the IT industry. And we hear one CTO's experiences of learning the privacy lessons of GDPR. Read the issue now.
Posted: 29 Oct 2021 | Published: 02 Nov 2021

ComputerWeekly.com

Computer Weekly - 21 September 2021: The cities planning for ethical use of AI
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to tech leaders in Barcelona and London about a collaboration to ensure ethical use of AI in the era of smart cities. The UK government wants to reform data protection law – we assess the implications. And we examine the latest best practice in hybrid cloud. Read the issue now.
Posted: 21 Sep 2021 | Published: 21 Sep 2021

ComputerWeekly.com

Computer Weekly - 7 September 2021: Highways England delivers a digital roadmap
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the CDIO of Highways England about her digital services and asset management plans. We also explore SIEM and SOAR security tools and we find out how McLaren Racing is using data analytics to build its cars more efficiently. Read the issue now.
Posted: 06 Sep 2021 | Published: 07 Sep 2021

ComputerWeekly.com

Computer Weekly - 10 August 2021: Real-time data analytics in action
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the emerging applications of real-time analytics and highlight the challenges for businesses to maximise the benefits. EU experts are calling for reform of US surveillance laws – we look at the issues. And we talk to the co-CEO of HR software giant Workday. Read the issue now.
Posted: 06 Aug 2021 | Published: 10 Aug 2021

ComputerWeekly.com

Data quality emerges from Covid-19 more critical than ever
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

Computer Weekly - 29 June 2021: Is the UK government planning to rewrite GDPR?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, a government taskforce on post-Brexit regulations has recommended changes to GDPR in the UK – we examine the implications. The NHS has launched a new data strategy - we look at what it means for your medical records. And we ask how to avoid the performance problems that affect private cloud. Read the issue now.
Posted: 25 Jun 2021 | Published: 29 Jun 2021

ComputerWeekly.com

Computer Weekly - 1 June 2021: The technology that enabled Covid-19 genome sequencing success
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the scientists behind the UK's gene sequencing work during the coronavirus pandemic to find out how cloud and data analytics enabled their success. It's three years since GDPR entered into law – we assess its progress. And we examine low-code software development for a small business. Read the issue now.
Posted: 27 May 2021 | Published: 01 Jun 2021

ComputerWeekly.com

Computer Weekly - 25 May 2021: Making data an asset, not a threat
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the latest developments in the UK government's National Data Strategy and what it means for the economy. Our latest buyer's guide explains the emerging technologies around computational storage. And we look at the advances in customer experience management during the pandemic. Read the issue now.
Posted: 24 May 2021 | Published: 25 May 2021

ComputerWeekly.com

CPRA Compliance Creates Complications for IT Ops
sponsored by Thales
EBOOK: PH
Posted: 14 May 2021 | Published: 14 May 2021

TOPICS:  Data Security
Thales

Zero-trust Implementation Begins With Choosing an On-Ramp
sponsored by Thales
EBOOK: PH
Posted: 14 May 2021 | Published: 14 May 2021

TOPICS:  Data Security
Thales

Comparing Data Protection vs. Data Security vs. Data Privacy
sponsored by Thales
EBOOK: PH
Posted: 14 May 2021 | Published: 14 May 2021

TOPICS:  Data Security
Thales

Executive Interview: Unleashing blockchain's potential
sponsored by ComputerWeekly.com
EGUIDE: Labrys founder and CEO Lachlan Feeney offers his observations about blockchain adoption in Australia, and what his firm is doing to help organisations unleash the full potential of the technology.
Posted: 13 May 2021 | Published: 14 May 2021

ComputerWeekly.com

CW Innovation Awards: NUHS taps RPA in Covid-19 swab tests
sponsored by ComputerWeekly.com
EGUIDE: In this case study, learn how Singapore's National University Health System deployed RPA bots to automate patient registration during Covid-19 swab tests as part of broader efforts to improve efficiency.
Posted: 11 May 2021 | Published: 11 May 2021

ComputerWeekly.com

eSentire MDR with Microsoft 365 Defender
sponsored by eSentire
RESOURCE: Access this resource to learn how combining eSentire Managed Detection and Response (MDR) with your existing investment in the Microsoft 365 ecosystem can help reduce your cybersecurity total cost of ownership, improve ROI and achieve better security outcomes.
Posted: 20 Apr 2021 | Published: 20 Apr 2021

TOPICS:  Data Security
eSentire

Making Sense of Sensitive Data
sponsored by PKWare
WHITE PAPER: In this white paper, read how PKWARE’s PK Protect offers data discovery and protection that locates and secures sensitive data to minimize organizational risks and costs, regardless of device or environment.
Posted: 20 Apr 2021 | Published: 20 Apr 2021

PKWare

Royal Holloway: The Computer Misuse Act and the characteristics of convicted hackers
sponsored by ComputerWeekly.com
RESEARCH CONTENT: In this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act
Posted: 01 Apr 2021 | Published: 07 Apr 2021

ComputerWeekly.com

Mainframe Security & Compliance
sponsored by BROADCOM, Inc
PODCAST: 80% of the world’s mission-critical data is stored on mainframes. Threat actors are always hunting this data, so enterprises must work to compliantly keep this data secure. But where do they start? Listen to this podcast to learn more about mainframe security and compliance and the challenges enterprises face in "securing the world".
Posted: 26 Mar 2021 | Premiered: Mar 26, 2021

BROADCOM, Inc

Compass®for Edge Computing
sponsored by Cobalt Iron
DATA SHEET: With Cobalt Iron Compass, you can eliminate the complexity and costs normally associated with edge computing backup processes. Download this datasheet to find out how and to discover the essential benefits of leveraging this solution for edge computing backup.
Posted: 23 Mar 2021 | Published: 23 Mar 2021

Cobalt Iron
1 - 25 of 1707 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2022, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences