IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
1 - 25 of 1982 Matches Previous Page  |  Next Page
Interview with Identity Expert
sponsored by Mitek Systems, Inc.
WHITE PAPER: In this Q and A, the head of risk and payments at an American money transfer company sits down with the customer success leader at Mitek to talk about role of identity verification in innovation and how increasing regulations will affect financial institutions. Read on to learn more.
Posted: 23 Jan 2020 | Published: 21 Jan 2020


Commvault Provides Native Access to Amazon S3 Including Amazon Glacier and Deep Archive
sponsored by Commvault
WEBCAST: Choosing a data management solution that compliments your backup and recovery system means simpler, streamlined data protection. Checkout this webcast to hear about a complete data management solution that uses a single interface for on premise and public cloud environments and offers auditing, reporting, and alerting capabilities.
Posted: 23 Jan 2020 | Premiered: Jan 23, 2020

Commvault

Security Governance: Building a Framework and Establishing Trust
sponsored by RSA Conference
WEBCAST: Not only is Kuwait’s oil and gas industry critical to its economy—it’s also heavily targeted by global threat actors. In this RSAC Unplugged presentation, see how Kuwait’s oil and gas companies reached a consensus around common security objectives and a unified governance framework to protect this vital sector.
Posted: 22 Jan 2020 | Premiered: Oct 10, 2019

RSA Conference

The 5 Most Dangerous New Attack Techniques: Are They Evolving?
sponsored by RSA Conference
WEBCAST: Each year at RSAC, SANS Institute reveals the most dangerous new attack techniques. On the list for 2019 were smartphone attacks, DNS manipulation, domain fronting, cloud-on-cloud attacks, CPU flaws and more. Watch this RSAC webcast to see the full—and accurate—list, plus the best methods to defeat these attacks.
Posted: 22 Jan 2020 | Premiered: Nov 19, 2019

RSA Conference

Threats of Surveillance Tools: Spyware and Stalkerware
sponsored by RSA Conference
PODCAST: Digital monitoring of workers, children and spouses is more commonplace than ever. But what happens when the line between monitoring and spying becomes blurred? Tune in to this RSAC podcast as two security experts share the work they’ve been doing to help protect victims and their personal data from unwanted surveillance.
Posted: 21 Jan 2020 | Premiered: Dec 16, 2019

RSA Conference

Understanding Recovery Readiness in a Not-So-Ready World.
sponsored by Commvault
WEBCAST: Modern recovery doesn’t come without its challenges, which is where having a recovery readiness strategy comes into play. Watch this webcast to learn the 3 essential elements of recovery readiness and to see how AI and ML are changing the backup landscape.
Posted: 21 Jan 2020 | Premiered: Jan 21, 2020

Commvault

Cloud Disaster Recovery: A Survival Guide by the University of Canberra
sponsored by Commvault
WEBCAST: By choosing a DR solution that automatically uploaded data daily and secured it for long-term retention, the University of Canberra could be sure that their data was safe in the event of a disaster. Watch this webcast to learn more about the solution that Canberra chose and the 5 transformational benefits it created.
Posted: 21 Jan 2020 | Premiered: Jan 21, 2020

Commvault

Protecting Intellectual Property: Black, White, and Shades of Gray
sponsored by InteliSecure
WHITE PAPER: Complying with data privacy regulations is important, but rarely is regulated data the only data worth protecting. Losses associated with regulatory fines present far less risk than the potential losses associated with intellectual property theft. In this white paper, learn how a data protection program can help you protect even unstructured IP.
Posted: 21 Jan 2020 | Published: 21 Jan 2020

InteliSecure

ThreatQ for Critical Infrastructure
sponsored by ThreatQuotient
RESOURCE: Critical infrastructure attacks can have long-term impacts on vital industries like power, healthcare, defense, food production and more. In this edition of ThreatQuotient’s Industry Brief, take an in-depth look into the challenges and key statistics surrounding critical infrastructure security.
Posted: 20 Jan 2020 | Published: 20 Jan 2020

ThreatQuotient

Comprehensive Lifecycle Management
sponsored by Insight
WEBCAST: The expectations of today’s workforce combined with the advancements in technology, means there are more mobile devices than ever before. While this is good for productivity, it creates its own set of security challenges. In this webcast, learn how to better protect your organization with Microsoft’s EM+S Solution and Insight.
Posted: 20 Jan 2020 | Premiered: Jan 20, 2020

Insight

University of Canberra saves A 135,000 by eliminating tapes with AWS and Commvault
sponsored by Commvault
CASE STUDY: By implementing a holistic solution that supported the cloud service providers they wanted to use, UC was able to reduce storage overhead by A$135,000 and improve their back up window by 38%. Read this case study to discover the solution UC put in place to transform their storage and to hear the remaining benefits they experienced.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Commvault

ThreatQ for Healthcare
sponsored by ThreatQuotient
DATA SHEET: The personal health information that healthcare providers process and store make them enticing targets for hackers. The average cost of a data breach over the past 2 years is $2.2 million, and the number of attacks is increasing rapidly. Read this white paper to uncover key cybersecurity insights for the healthcare industry.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

ThreatQuotient

Ransomware - Protect Your Data
sponsored by Commvault
WEBCAST: One trend that is gaining popularity in ransomware recovery is a holistic solution with an ability to align recovery operations to the value of the data. Tune into this webcast to view the key takeaways from this Gartner research, analyze real-world ransomware case studies, and discover the 4 key elements of a risk mitigation strategy.
Posted: 17 Jan 2020 | Premiered: Jan 17, 2020

Commvault

Data governance more important now than ever
sponsored by ComputerWeekly.com
EGUIDE: As organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

ComputerWeekly.com

Cost Efficient Backups for the Enterprise
sponsored by Druva
WHITE PAPER: Access this white paper for a rundown of the pros and cons of each type of deduplication and to view a solution that unifies data protection with global dedupe to break up operational silos and simplify administration.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

Druva

Data Housekeeping Checklist
sponsored by IBM
RESOURCE: Download this 17-point data housekeeping checklist to prep your organization for putting AI and ML technologies to work and to ensure that, in both training and inference, your systems and admins are prepared to handle these intensive workloads.
Posted: 15 Jan 2020 | Published: 15 Jan 2020

IBM

Gain Situational Awareness to Improve Critical Event Management
sponsored by EverBridge Inc.
WHITE PAPER: Access this white paper to learn several techniques to improve your organization’s critical event management (CEM) like the OODA loop, data collection, and the 4 steps to resolving crises.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

EverBridge Inc.

9 Steps to Critical Event Management Improvement
sponsored by EverBridge Inc.
EGUIDE: By leveraging a holistic approach to CEM, organizations can look forward to a more unified, distributed, automated, and collaborative process. Access this white paper to discover an essential 9-step CEM process that organizations can use to improve their responses to critical events.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

EverBridge Inc.

Why Data Capture and Automation Are Key to Digital Transformation
sponsored by IBM
EBOOK: Access this e-book to learn the 5 ways data capture and automation are changing the way we process information today and the 3 crucial components to consider when weighing data capture solutions.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

IBM

ZeroNorth 2019 End of Year Report
sponsored by ZeroNorth
WHITE PAPER: 2019 has been a formative year in cybersecurity – growing security risks and compliance regulations put pressure on organizations to rethink their current strategy. This annual report highlights key statistics to show where the security landscape is trending to help you position yourself for success in 2020.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

ZeroNorth

Fraud Detection in Healthcare: a step-by-step guide to incorporating machine learning
sponsored by Dataiku
EGUIDE: There are many AI-based use cases that span the healthcare industry, all with the goal of improving patient care. Access this white paper to learn the 3 basic types of anomalies that may be detected and to learn how to confront the challenges of fraud and anomaly detection with 4 AI and ML-based approaches.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

Dataiku

Enterprise Family Guide
sponsored by TechData - Seagate
WHITE PAPER: Access this white paper to learn about a family of vertically integrated Enterprise Data Solutions from Seagate, including the Exos Enterprise Hard Drives and the Nytro Enterprise Solid-State Drives, that are fit to accommodate zettabyte-level data capacity and performance.
Posted: 10 Jan 2020 | Published: 10 Jan 2020

TechData - Seagate

GDPR Perspectives: Rethinking Data Discovery for Privacy and GDPR
sponsored by BigID
WHITE PAPER: With data privacy laws like GDPR regulating the way organizations manage data, it’s grown increasingly critical for organizations to take a strategic approach to the way they collect, process, and categorize data. Read this white paper to learn about the rising popularity of data classification solutions and other discover tools.
Posted: 10 Jan 2020 | Published: 10 Jan 2020

BigID

Cyber Chief Magazine: 7th Edition
sponsored by Netwrix Corporation
WHITE PAPER: Even though there are numerous benefits for incorporating cloud capabilities, organizations remain hesitant – likely due to the perceived security deficiencies. This edition of Cyber Chief Magazine addresses this concern by looking at the various types of content stored in the cloud and proven security strategies for protecting that data.
Posted: 10 Jan 2020 | Published: 10 Jan 2020

Netwrix Corporation

Under the Hoodie 2019
sponsored by Rapid7
RESOURCE: Due to the sensitive nature of its findings, penetration testing is a relatively unknown, yet critical, piece of the information security puzzle. This study by Rapid7 was an effort to demystify what goes on in a typical pen test by examining 180 engagements to break down what clients and practitioners should expect to see.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

Rapid7
1 - 25 of 1982 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info