IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
1 - 25 of 1899 Matches Previous Page  |  Next Page
CW Benelux - February-April 2021: Is reluctance to report cyber crimes in the Netherlands helping the criminals to get away?
sponsored by ComputerWeekly.com
EZINE: According to an academic study in the Netherlands, only one in seven Dutch people report a cyber crime to the police when it happens - feeling it is better to sort the problem out themselves because they don't think the police will do anything.
Posted: 20 Jan 2021 | Published: 11 Feb 2021

ComputerWeekly.com

The anatomy of 5 Notorious Cloud Data Breaches
sponsored by Sonrai security
EBOOK: In this guide, go in depth about 5 notorious cloud data breaches in order to understand how to better protect your organization from these dangerous occurances.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

TOPICS:  Data Security

Enterprise Data Protection Solutions, Explained
sponsored by Forcepoint
EGUIDE: It’s hard to overstate the value of data protection given its ability to safeguard critical assets, maintain brand image and avoid legal issues. However, choosing the right data protection partner can be tough. This data protection buyer’s guide offers key search criteria, questions to ask potential partners and more – read on to get started.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Forcepoint

How the Security Inversion Impacts User and Data Protection
sponsored by Netskope
WHITE PAPER: Legacy cybersecurity methods are becoming increasingly inefficient against today’s cyberthreats. Modernizing the security model is necessary to ensure innovation and the protection of data and users. Read this white paper to learn more about ensuring effective security in a cloud and mobile-first world.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

Netskope

A New Vision for Secure Web Gateways
sponsored by Netskope
RESOURCE: The rise of remote work and the shift towards the cloud has impacted nearly every aspect of how we work. Gartner’s 2020 Magic Quadrant report for Secure Web Gateways (SWG) highlighted these impacts and recognized Netskope as a leader in this area – read this article to find out why.
Posted: 13 Jan 2021 | Published: 11 Dec 2020

Netskope

California Consumer Privacy Act (CCPA) Compliance
sponsored by Socure
DATA SHEET: While the CCPA aims to protect and empower consumers, it also has the potential to expose businesses (and their customers) to breaches and other kinds of misuse of personal information. Read this data sheet to learn more about the risks related to CCPA and how to protect against them.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Socure

Learn from Your Security Peers
sponsored by Forcepoint
WEBCAST: In this webcast, Forcepoint VP of Platform and Solution Marketing Ravi Srinivasan sits down with IDG's Bob Bragdon to discuss the research and what companies like yours can do to stay secure.
Posted: 12 Jan 2021 | Premiered: Jan 12, 2021

Forcepoint

Here Comes 2021: 5 Safe Bets and 5 Long Shot Predictions
sponsored by Netskope
WHITE PAPER: Quite often, things don’t go as planned (as least as far as the big events in life go). For networking and security professionals, this was true of plans made in 2019 for 2020. All of 2019’s plans went out the window early on, and organizations had to adjust. So, what are experts saying about 2021? Download this article to find out.
Posted: 11 Jan 2021 | Published: 24 Nov 2020

Netskope

The Third Question: What CISOs aren’t asking - and what’s at stake.
sponsored by Absolute Software Corporation
WHITE PAPER: The role CISO is the world’s most stressful balancing act between ensuring operational efficiency and protection against sinister cyberthreats. In this white paper, 4 of the world’s top cybersecurity innovators weigh in on the critical questions CISOs need to be – but often aren’t – asking themselves.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Absolute Software Corporation

Evonik Industries Success Story
sponsored by SNP Transformation
CASE STUDY: For Evonik, a global chemicals company, balancing a growing list of compliance mandates with data protection and employee productivity is a difficult task. Read this case study to see why they partnered with SNP to address these challenges and discover the outcomes of this initiative.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

SNP Transformation

Dealing with VUCA
sponsored by InteliSecure
EGUIDE: Today’s IT and security leaders are responsible for dealing with VUCA – volatility, uncertainty, complexity, and ambiguity – and address data security risks in an ever-changing landscape. Read this InteliSecure e-guide to address the elements of VUCA and build agile data protection.
Posted: 30 Dec 2020 | Published: 30 Dec 2020

InteliSecure

Avoiding The 3 Pitfalls Of Data Chaos
sponsored by Talend
EBOOK: Access this e-book to learn 4 benefits that Talend Data Fabric provides to help organizations attain their key business goals, conquer the data chaos, and examine 4 case studies that put it all into practice.
Posted: 29 Dec 2020 | Published: 29 Dec 2020

Talend

Manage Security Risk With Red Hat Insights
sponsored by Red Hat
PRODUCT OVERVIEW: Managing today’s cyberthreats requires the ability to rapidly assess, prioritize and remediate potential threats. Read this solution brief for a comprehensive overview of the key features and capabilities of Red Hat Insights, designed to help organizations manage risks with enhanced visibility.
Posted: 28 Dec 2020 | Published: 28 Dec 2020

Red Hat

The New Workplace: Modernizing Security, Compliance and Remote Work
sponsored by Microsoft
RESOURCE CENTER: Today, nothing is more important than empowering your remote workforce with modern, integrated, resilient, cloud-enabled security and compliance protections. Check out this information hub to help you address your most pressing workplace challenges today.
Posted: 28 Dec 2020 | Published: 28 Dec 2020

Microsoft

Securedoc On Top For Bitlocker
sponsored by WinMagic
DATA SHEET: In this product brief, learn about WinMagic’s SecureDoc Enterprise Server (SES) and how it secures data at rest by managing how it’s encrypted, regardless of the operating system, or where the data resides.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

WinMagic

Protecting Healthcare Data With Removable Media Container Encryption
sponsored by WinMagic
CASE STUDY: Healthcare professionals are facing the growing challenge of balancing the security of patient data with ease of authorized access. Read this case study to see how one healthcare institution was able to achieve effective data management across various devices without sacrificing functionality.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

WinMagic

Ransomware Threat Spotlight
sponsored by Barracuda
VIDEO: Another unfortunate consequence of 2020 was the apparent rise of ransomware threats, especially those targeting remote workers. This webinar provides a look back at the top ransomware trends of 2020, highlighting key tactics, common vulnerabilities and more – watch now to get started.
Posted: 23 Dec 2020 | Premiered: 23 Dec 2020

Barracuda

SecureDoc File Encryption
sponsored by WinMagic
DATA SHEET: When it comes to protecting sensitive data, full drive encryption sets a strong data protection foundation. But file-level protection adds an additional layer of security, and as such, it’s often recommended as part of a defense-in-depth security strategy. Scan through this data sheet to read up on SecureDoc File Encryption.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

WinMagic

10 Experts on Active Threat Management
sponsored by GoSecure
EBOOK: The number of pervasive cyberthreats is growing larger with each passing week, which can leave security professionals feeling overwhelmed. In this e-book, hear from 10 IT security experts, including directors and C-level executives, on active threat management and data protection, and learn how you can better predict, prevent and detect attacks.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

GoSecure

Leading private hospital boosts email security to protect user data
sponsored by Barracuda
CASE STUDY: Healthcare is one of the most frequently targeted verticals and patient data has grown in value to cybercriminals. This case study follows how Richard Andrews, Head of IT at King Edward VII’s hospital in London, was able to implement email security for his most vulnerable patients – including members of the Royal Family.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

Barracuda

3 Top Ways to Improve Data Protection and Governance for Secure Remote Work
sponsored by Microsoft
RESOURCE: If you’re using Microsoft products such as Outlook or Teams, don’t you want to make sure that the data going through them is protected, compliant and governed? Well you’re in luck – Microsoft has released specific integrations designed to make these processes simpler. Download this article to see 3 key ways these solutions meet the challenge.
Posted: 18 Dec 2020 | Published: 18 Dec 2020

Microsoft

Data Science Finds New Role in the Fight Against COVID-19
sponsored by Dell Technologies and NVIDIA
WHITE PAPER: Examine the following white paper to learn how pros are benefiting from data scientist workstations instead of consumer PCs and how GPU-accelerated data visualization and analysis could lead to a better understanding of COVID-19.
Posted: 16 Dec 2020 | Published: 16 Dec 2020

Dell Technologies and NVIDIA

Protect Sensitive Information by Deterring Print & Screen Capture Behaviors
sponsored by Fasoo
PRESENTATION: While more than half of organizations have experienced a print-related data breach, less than a quarter have made strides to implement secure printing initiatives. Read this report to learn more about print-related risks that lead to data breaches and how to protect your organization against these growing threats.
Posted: 15 Dec 2020 | Published: 15 Dec 2020

Fasoo

Enabling Speed, Mitigating Risk: The Crucial Role of the Modern Data Platform
sponsored by MongoDB, Inc.
WHITE PAPER: Many companies are demanding faster rates of innovation; while this push might create greater business value, it can also expose businesses to security and other issues. Read on to learn how companies employed MongoDB to support rapid innovation across a variety of environments, including cloud, without sacrificing reliability or security.
Posted: 15 Dec 2020 | Published: 01 Dec 2020

MongoDB, Inc.

Protect Your Data on the Way to the Cloud
sponsored by Atakama
RESOURCE: Digital transformation has emerged as a key driver to cloud migration – in fact, 83% of workloads are expected to be cloud-based by the end of the year. Securing your data as you migrate it to the cloud is essential. Read this article to learn more about common cloud migration challenges and how to protect your data in transition.
Posted: 10 Dec 2020 | Published: 28 Oct 2020

Atakama
1 - 25 of 1899 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info