IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
1 - 25 of 2701 Matches Previous Page  |  Next Page
Anatomy of a Cyber Attack The Lifecycle of a Security Breach
sponsored by Oracle Corporation
WHITE PAPER: Security is everyone's job today, from consumers, to system administrators, to executives. Explore this resource to gain insight into the anatomy of a cyberattack, the lifecycle of a security breach and how to augment your current approach to protect your sensitive data.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

Oracle Corporation

A Look Into the Global "Drive-by Cryptocurrency Mining" Phenomenon
sponsored by Tech Data - MalwareBytes
WHITE PAPER: Cryptocurrencies were bound to trigger the interest of criminals and it wasn't long before coin mining malware made an appearance. Explore this resource to gain insight into the phenomenon known as "drive-by cryptocurrency mining".
Posted: 20 Apr 2018 | Published: 20 Apr 2018

Tech Data - MalwareBytes

The Year of Internal Threats and Accidental Data Breaches
sponsored by Gemalto
RESEARCH CONTENT: According to the Breach Level Index report, there were 2,600,968,280 records breached in 2017 making it a record year for stolen data. Explore the report to gain insight into why 2017 is being referred to as the year of internal threats and accidental data breaches.
Posted: 20 Apr 2018 | Published: 18 Apr 2018

Gemalto

The 2018 Global Cloud Data Security Study
sponsored by Gemalto
RESEARCH CONTENT: According to a Ponemon Institute Study, 53% of respondents believe their organization does not have a proactive approach to managing compliance with privacy and data protection regulations in the cloud. Explore the report to gain insight into enterprises' cloud data security measures and how they plan to protect sensitive data within the cloud.
Posted: 20 Apr 2018 | Published: 18 Apr 2018

Gemalto

Crypto-Agility: Security Without Compromise
sponsored by Gemalto
WHITE PAPER: Cryptographic protocols and algorithms evolve over time to counter new security threats. This resource explores Gemalto's encryption strategy, which can help you gain certified high-assurance network security, maximum network and application performance, and more.
Posted: 20 Apr 2018 | Published: 18 Apr 2018

Gemalto

Visual Investigator
sponsored by SAS
RESOURCE: With more data at a business' fingertips than ever before, there's the opportunity to proactively investigate issues rather than be reactive and wait for an issue to emerge. Discover how a visual investigator can help proactively identify areas that need further investigation.
Posted: 19 Apr 2018 | Published: 31 Dec 2017

SAS

3 Ways Enterprise Content Management Systems Make GDPR Compliance Easier
sponsored by Ephesoft
RESOURCE: Discover 3 ways a sound ECM system can help simplify GDPR compliance and keep your information safe in increasingly digital and cloud-enabled environments.
Posted: 19 Apr 2018 | Published: 19 Apr 2018

Ephesoft

Using Blockchain-Based Rewards to Combat Ocean Plastic
sponsored by IBM
WHITE PAPER: It's estimated that the equivalent of one garbage truck full of plastic waste enters the oceans every minute. Learn how one company saw this as an opportunity, and discover what technology they turned to make sure their global transactions run safely and securely.
Posted: 19 Apr 2018 | Published: 30 Sep 2017

IBM

The Modern Mainframe and Machine Learning
sponsored by IBM
RESOURCE: In this resource, explore how the modern mainframe has been optimized for machine learning to deliver in-place analysis of valuable and timely data. And how mainframes can help with fraud and compliance too.
Posted: 18 Apr 2018 | Published: 30 Sep 2017

IBM

Shining a Light on File Sharing and Shadow IT
sponsored by Citrix
WHITE PAPER: Learn 5 reasons why a business-grade file sharing platform can help enable employees to collaborate and access information while maintaining sound data security.
Posted: 18 Apr 2018 | Published: 18 Apr 2018

Citrix

2018 Identity and Access Management Index Report
sponsored by Gemalto
RESEARCH CONTENT: According to the Identity and Access Management Index, 90% of respondents admit that their organization's security policies around access management have been influenced by breaches of consumer services. Take a look at this report to learn about where organizations stand in terms of IAM and how they plan to augment security in the near future.
Posted: 18 Apr 2018 | Published: 18 Apr 2018

Gemalto

How to Prepare for GDPR
sponsored by AlienVault
WEBCAST: The GDPR requires organizations to maintain a plan to detect data breaches, regularly evaluate the effectiveness of security practices, and document evidence of compliance. Take a look at this webcast to uncover a compliance and unified security management approach to prepare for the GDPR.
Posted: 18 Apr 2018 | Premiered: Apr 18, 2018

AlienVault

Are Security Threats Keeping You Up at Night?
sponsored by Citrix
WHITE PAPER: Discover 5 steps to secure file sharing, designed to help you maintain compliance and data security without restricting access to information.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

Citrix

Operationalize Security To Secure Your Data Perimeter
sponsored by IBM
RESEARCH CONTENT: According to a Forrester report, 46% of organizations encrypt little to none of their data. Take a look at this report to gain insight into how organizations are attempting to operationalize security in order to protect their vast stores of data.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

IBM

Data Secrets Revealed - A Collection of Customer Stories
sponsored by Splunk
RESOURCE: Tap into this resource to see how analysts, IT directors and CISOs at forward-thinking organizations such as Vodafone, Ubisoft and Domino's Pizza are approaching big data analytics and security.
Posted: 17 Apr 2018 | Published: 31 Dec 2017

Splunk

7 Must-Haves for Secure File Sharing
sponsored by Citrix
WHITE PAPER: This white paper explores how to select an IT-approved secure file-sharing service so that you can enable users to access and share the data they need. Discover 7 non-negotiable considerations for your file-sharing platform.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

Citrix

Leveraging Enterprise Content To Transform Business: A Best Practice Guidebook
sponsored by OnBase by Hyland
RESEARCH CONTENT: Analyst firm Frost & Sullivan explain the evolution of the ECM industry as it shifts to content services.
Posted: 16 Apr 2018 | Published: 31 Dec 2017

OnBase by Hyland

Securing Cloud Infrastructure and Applications with a SOC-as-a-Service
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: As cyberattacks grow more common, and bad actors increasingly exploit the cloud, IT professionals need robust cloud security strategies to protect their company. This white paper explores how the hybrid architecture of modern business increases exposure to all major types of cyberattacks.
Posted: 16 Apr 2018 | Published: 16 Apr 2018

Arctic Wolf Networks, Inc.

Malware Quiz
sponsored by Cisco Umbrella
RESOURCE: Every good story needs a villain, and the world of network security has plenty. Explore this resource to test your malware IQ (and your knowledge of fairy tales) by taking our quick quiz on famous villains.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

Cisco Umbrella

Tips and Tricks for Deploying Next-Generation Cybersecurity Using Micro-Segmentation
sponsored by VMware
WHITE PAPER: According to the Ponemon Institute, 89% of organizations have experienced a data breach. Take a look at this resource to uncover a strategy for rethinking your security strategy to meet next-generation security challenges by utilizing micro-segmentation.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

VMware

4 Opportunities to Create a Strategic Cybersecurity Advantage
sponsored by Nuix
WHITE PAPER: Cybersecurity breaches are a pandemic weakness exposing the whole world. Let's face it, they're going to happen. Take a look at this resource to uncover 4 opportunities to create a strategic cybersecurity advantage.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

Nuix

The Black Report 2018 - Decoding the Minds of Hackers
sponsored by Nuix
WHITE PAPER: According to the 2018 Black Report, 34% of respondents have been hacking for more than 10 years. Take a look at this report to learn more about the hackers targeting your enterprise.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

Nuix

Driving Innovation with GDPR
sponsored by DXC
WHITE PAPER: GDPR is a compliance challenge. Given the digital, complex and fast-evolving nature of its subject, it's also inherently a technology challenge. Explore this resource to learn about driving innovation with GDPR.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

DXC

How to Respond to the 2018 Threat Landscape
sponsored by VMware
WHITE PAPER: By 2020, 1/3 of successful attacks experienced by enterprises will be on data located in shadow IT resources, including shadow IoT. Explore this Gartner report to gain insight into responding to the 2018 threat landscape.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

VMware

GDPR and the Retail Sector
sponsored by DXC
WHITE PAPER: With more reported data breaches in the retail sector than any other, the advent of GDPR means retailers need to keep the positive focus on data as an asset, rather than a burden. Take a look at this resource to learn how GDPR is impacting the retail sector.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

DXC
1 - 25 of 2701 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement