IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
1 - 25 of 1818 Matches Previous Page  |  Next Page
The Future Of Data Protection Is Here - Automation And AI Can Help Your Company To Stay A Step Ahead Of Cybercriminals
sponsored by Dathena
BLOG: Read on to learn how AI-powered data protection management allows you to automate tedious tasks like data classification and discovery, freeing up your human agents to deal with complex problems and respond to serious cyberthreats more quickly.
Posted: 28 Jul 2021 | Published: 28 Jul 2021

Dathena

Data Security And Privacy Don’t Have To Break The Bank
sponsored by Dathena
BLOG: As IT costs continue to escalate and data ecosystems grow even more complex, businesses face additional cost and risk from data privacy laws like the GDPR and CCPA. Read this post to learn how automated data privacy by Dathena offers a ready to use, AI and ML powered approach to data privacy that saves you time, money, and headache.
Posted: 28 Jul 2021 | Published: 28 Jul 2021

Dathena

FIRESIDE CHAT WITH SCHRODERS
sponsored by Rubrik
VIDEO: Protecting data against the eventuality of a breach is challenging yet critical function for today’s IT and security teams. Watch this fireside chat to join leaders at Rubrik and Schroders as they discuss the importance of data enablement, the consequences of a breach, and more.
Posted: 22 Jul 2021 | Premiered: 22 Jul 2021

TOPICS:  Data Security
Rubrik

Classification Review “A Good Human Plus A Machine Is The Best Combination”
sponsored by Dathena
WHITE PAPER: By partnering AI solutions with human expertise and judgement, data classification shortcomings can be surmounted. Read on to learn how Dathena leverages AI to improve the quality of classification, with its mechanism evolving over time alongside your own data.
Posted: 22 Jul 2021 | Published: 22 Jul 2021

Dathena

Computer Weekly - 29 June 2021: Is the UK government planning to rewrite GDPR?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, a government taskforce on post-Brexit regulations has recommended changes to GDPR in the UK – we examine the implications. The NHS has launched a new data strategy - we look at what it means for your medical records. And we ask how to avoid the performance problems that affect private cloud. Read the issue now.
Posted: 25 Jun 2021 | Published: 29 Jun 2021

ComputerWeekly.com

Data Security Platform Solution Brief
sponsored by Comforte AG
RESOURCE: With Comforte SecurDPS platform, your organization can gain a unique and powerful perspective for planning privacy compliance, implementing cloud migrations, and then measuring your breach risks in a quantitative manner. Access this solution brief to learn more about the benefits of Comforte SecurDPS platform.
Posted: 07 Jun 2021 | Published: 07 Jun 2021

TOPICS:  Data Security
Comforte AG

Let's Talk About Data Security for Cloud & PII
sponsored by Comforte AG
WHITE PAPER: Comforte's data security platform secures all your sensitive data and information intended for applications using standard protocols, especially useful for aaS applications. Access this PDF to learn more about data-centric security and the benefits of Comforte's data security platform.
Posted: 04 Jun 2021 | Published: 04 Jun 2021

TOPICS:  Data Security
Comforte AG

Risk-Adaptive Data Protection Webcast
sponsored by Forcepoint
WEBCAST: Learn how Risk-Based DLP balances employee productivity with providing effective breach protection.
Posted: 03 Jun 2021 | Premiered: Jun 3, 2021

TOPICS:  Data Security
Forcepoint

Risk-Adaptive Data Protection: The behavior-based approach
sponsored by Forcepoint
EBOOK: Learn how Risk-Adaptive DLP goes beyond traditional solutions to meet the needs of your expanded ecosystem.
Posted: 03 Jun 2021 | Published: 03 Jun 2021

TOPICS:  Data Security
Forcepoint

Computer Weekly - 1 June 2021: The technology that enabled Covid-19 genome sequencing success
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the scientists behind the UK's gene sequencing work during the coronavirus pandemic to find out how cloud and data analytics enabled their success. It's three years since GDPR entered into law – we assess its progress. And we examine low-code software development for a small business. Read the issue now.
Posted: 27 May 2021 | Published: 01 Jun 2021

ComputerWeekly.com

Computer Weekly - 25 May 2021: Making data an asset, not a threat
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the latest developments in the UK government's National Data Strategy and what it means for the economy. Our latest buyer's guide explains the emerging technologies around computational storage. And we look at the advances in customer experience management during the pandemic. Read the issue now.
Posted: 24 May 2021 | Published: 25 May 2021

ComputerWeekly.com

Zero-trust Implementation Begins With Choosing an On-Ramp
sponsored by Thales
EBOOK: PH
Posted: 14 May 2021 | Published: 14 May 2021

TOPICS:  Data Security
Thales

CPRA Compliance Creates Complications for IT Ops
sponsored by Thales
EBOOK: PH
Posted: 14 May 2021 | Published: 14 May 2021

TOPICS:  Data Security
Thales

Comparing Data Protection vs. Data Security vs. Data Privacy
sponsored by Thales
EBOOK: PH
Posted: 14 May 2021 | Published: 14 May 2021

TOPICS:  Data Security
Thales

Data-as-as-Service solves traditional security problems
sponsored by HammerSpace
PODCAST: Join Jon McLachlan, host of The Security Podcast of Silicon Valley, as he sits down with Anand Ganesh, Founding Software Architect at Hammerspace, to discuss how storageless data and Data-as-as-Service solve traditional B2B data protection and security problems like encrypting data at rest.
Posted: 14 May 2021 | Premiered: May 6, 2021

HammerSpace

Executive Interview: Unleashing blockchain's potential
sponsored by ComputerWeekly.com
EGUIDE: Labrys founder and CEO Lachlan Feeney offers his observations about blockchain adoption in Australia, and what his firm is doing to help organisations unleash the full potential of the technology.
Posted: 13 May 2021 | Published: 14 May 2021

ComputerWeekly.com

CW Innovation Awards: NUHS taps RPA in Covid-19 swab tests
sponsored by ComputerWeekly.com
EGUIDE: In this case study, learn how Singapore's National University Health System deployed RPA bots to automate patient registration during Covid-19 swab tests as part of broader efforts to improve efficiency.
Posted: 11 May 2021 | Published: 11 May 2021

ComputerWeekly.com

The Key Pillars for Protecting Sensitive Data in Any Organization
sponsored by Thales
EBOOK: Take a brief survey to access an informative white paper on the 3 pillars of data-centric security and the CipherTrust Data Security platform by Thales.
Posted: 04 May 2021 | Published: 04 May 2021

TOPICS:  Data Security
Thales

Building a Strong Foundation for Data Privacy and Security
sponsored by Thales
EBOOK: Take a quick survey to access a PDF download to learn about Thales CipherTrust Data Discovery and Classification, which allows you to easily uncover and mitigate privacy risks, enforce data sovereignty, and comply with a growing number of data privacy and security regulations, such as, CCPA, PCI DSS and HIPAA.
Posted: 04 May 2021 | Published: 04 May 2021

TOPICS:  Data Security
Thales

eSentire MDR with Microsoft 365 Defender
sponsored by eSentire
RESOURCE: Access this resource to learn how combining eSentire Managed Detection and Response (MDR) with your existing investment in the Microsoft 365 ecosystem can help reduce your cybersecurity total cost of ownership, improve ROI and achieve better security outcomes.
Posted: 20 Apr 2021 | Published: 20 Apr 2021

TOPICS:  Data Security
eSentire

Making Sense of Sensitive Data
sponsored by PKWare
WHITE PAPER: In this white paper, read how PKWARE’s PK Protect offers data discovery and protection that locates and secures sensitive data to minimize organizational risks and costs, regardless of device or environment.
Posted: 20 Apr 2021 | Published: 20 Apr 2021

PKWare

SSO in the Cloud and Mobile Era
sponsored by Techtarget
RESOURCE: Single sign-on has always appeared to be the best option for log-in security, however, as use of the cloud increases and the BYOD trend continues to grow, additional protection is necessary to keep data protected. We're offering free access to one of our expert guides, SSO in the Cloud and Mobile Era.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

Techtarget

Royal Holloway: The Computer Misuse Act and the characteristics of convicted hackers
sponsored by ComputerWeekly.com
RESEARCH CONTENT: In this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act
Posted: 01 Apr 2021 | Published: 07 Apr 2021

ComputerWeekly.com

Compass®for Edge Computing
sponsored by Cobalt Iron
DATA SHEET: With Cobalt Iron Compass, you can eliminate the complexity and costs normally associated with edge computing backup processes. Download this datasheet to find out how and to discover the essential benefits of leveraging this solution for edge computing backup.
Posted: 23 Mar 2021 | Published: 23 Mar 2021

Cobalt Iron

COBALT IRON COMPASS®Data Protection for a Remote World
sponsored by Cobalt Iron
DATA SHEET: With Cobalt Iron Compass, customers can remotely manage, monitor, track, patch, and protect backup hardware and software—all from a single dashboard. Download the datasheet here to ensure your team can confidently keep your company’s data protection healthy, stable, and secure while working remote.
Posted: 22 Mar 2021 | Published: 22 Mar 2021

Cobalt Iron
1 - 25 of 1818 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences