IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
1 - 25 of 2638 Matches Previous Page  |  Next Page
Are You Ready for GDPR? The Top 10 Things to Know for GDPR Compliance
sponsored by Evident
WEBCAST: Time is running out for companies that process personal data of those within the EU to be in compliance with the GDPR. This webcast reveals 10 key considerations that need to be made for controlling how data is accessed, stored, kept up to date, transferred and deleted.
Posted: 23 Feb 2018 | Premiered: Feb 23, 2018

Evident

Expanding the Threat Intelligence Horizon
sponsored by Phantom Cyber
VIDEO: How is your organization defending and responding to threats? Explore this webcast to uncover an automated threat hunting and response cyber defense approach, which includes a cloud assisted security strategy and integrated security strategies.
Posted: 23 Feb 2018 | Premiered: 21 Feb 2018

Phantom Cyber

Does the GDPR Apply to You?
sponsored by Imperva
WHITE PAPER: Organizations which are not in compliance with the GDPR can expect very stiff financial penalties. This resource offers insight into which organizations the GDPR applies, key data security requirements of the regulation, non-compliance penalties and more.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Imperva

GDPR: The Penalties for Non-Compliance
sponsored by Imperva
WHITE PAPER: The GDPR gives data protection authorities more investigative and enforcement powers. This resource reveals the harsh penalties of not complying with the GDPR.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Imperva

Integrating Human and Technological Elements in your Security Strategy
sponsored by Kaspersky Lab
WHITE PAPER: Cybercrime damages are expected to cost the world $6 trillion by 2021, according to CSO. This resource offers strategies for protecting your business from the ever-changing threat landscape.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Kaspersky Lab

The Mystery of the APT
sponsored by Kaspersky Lab
WHITE PAPER: For companies that experiences a targeted attack, 68% report data loss or exposure as a direct result of the attack, according to a Kaspersky Lab study. This resource reveals insight into advanced persistent threats (APTs) and offers protection strategies to avoid falling victim to harmful attacks.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Kaspersky Lab

5 Ways Modern Malware Defeats Your Defenses
sponsored by Radware
WHITE PAPER: According to the Verizon DBIR, 51% of data breaches include the usage of malware, whether for initial breach, expansion within the network or heisting data. This resource reveals 5 common evasion techniques used by modern malware and how they conquer anti-malware defenses.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Radware

Get Going with your GDPR Plan
sponsored by Imperva
RESOURCE: How is your organization preparing for GDPR's May 2018 deadline? Take a look at this infographic to uncover a step-by-step plan for complying with the GDPR.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Imperva

Understanding the General Data Protection Regulation
sponsored by Evident
RESOURCE: The primary purpose of GDPR is to protect personal data. To avoid stiff GDPR penalties and ensure your data is protected, your business will need to spend a great deal of time assessing and planning to implement operational and technology changes. Here are 5 areas you'll need to consider.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Evident

Top 5 Database Security Threats
sponsored by Imperva
WHITE PAPER: According to the Verizon DBIR, hackers are motivated by financial gain, espionage, ideology or grudge, and even fun. This white paper examines the top 5 database security threats and explains how risk sensitive organizations must remain a step ahead in their security posture.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Imperva

Datto's State of the Channel Ransomware Report: Canada
sponsored by Datto, Inc.
RESEARCH CONTENT: This research report from more than 200 MSPs in Canada outlines how ransomware is targeting customers, and how your contemporaries are combatting this growing threat.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Datto, Inc.

Preparing Your Organization for the GDPR
sponsored by Imperva
WHITE PAPER: Where does your organization stand in terms of GDPR preparedness? Access this resource to uncover 5 questions to determine what GDPR means for your organization and how to prepare.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Imperva

Protecting Your Sensitive Data
sponsored by Symantec
VIDEO: Protecting users across various environments can be a challenge. Access this brief webcast to uncover 4 tangible steps to protecting users across endpoints and the cloud.
Posted: 20 Feb 2018 | Premiered: 14 Feb 2018

Symantec

6 Ways a CASB Makes Cloud Apps Safe for Business
sponsored by Symantec
WHITE PAPER: By 2022, 65% of business productivity tools are expected to have moved to the cloud, according to the Symantec Internet Security Threat Report. This resource offers 6 ways a cloud access security broker (CASB) enables cloud control across all apps and data.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Symantec

Cloud Security: Making Sense of the Shared Responsibility Model
sponsored by Oracle Corporation
WHITE PAPER: For enterprises using cloud services, there's a lot of confusion surrounding the shared responsibility model, particularly with what security measures the enterprise must provide. This resource explores the root cause behind this confusion and offers examples of how enterprises are successfully addressing and embracing the model.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Oracle Corporation

Web Application Security in a Digitally Connected World
sponsored by Radware
RESEARCH CONTENT: According to a recent Ponemon Institute study, 68% of organizations admit low confidence in their information security posture. Explore this research report to gain insight into 3 web application security challenges facing organizations today.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Radware

The Future of Privileged Management
sponsored by One Identity
VIDEO: The numbers of privileged accounts are growing as everything and everyone is becoming more and more connected. Key into this webcast to learn where privileged management is heading and uncover an approach to securing privileged accounts.
Posted: 19 Feb 2018 | Premiered: 14 Feb 2018

One Identity

Cloud Apps and Data Security: Are You Safe from the New Threats?
sponsored by Symantec
RESOURCE: How do you plan to conquer cloud chaos within your organization? This resource reveals how a cloud access security broker (CASB) can augment your cloud security approach, while embracing productivity-boosting cloud apps and services.
Posted: 19 Feb 2018 | Published: 19 Feb 2018

Symantec

IoT and the New Security Challenge
sponsored by Juniper Networks
WEBCAST: According to a Juniper Networks survey, 94% of enterprises are changing the way they think about security due to IoT. Explore this webcast to learn about IoT and the need to consider security within your organization's IoT strategy.
Posted: 19 Feb 2018 | Premiered: Feb 19, 2018

Juniper Networks

Regulating Privileged Access: When to Require Human Approval Workflows
sponsored by One Identity
VIDEO: Regulating privileged access can be extremely difficult across enterprises. This webcast reveals how to protect privileged access by keeping the human element involved without risking security or killing productivity.
Posted: 19 Feb 2018 | Premiered: 14 Feb 2018

One Identity

Mitigate the top nine cloud threats with a cloud access security broker (CASB)
sponsored by Oracle Corporation
WHITE PAPER: Today's enterprises run 41% of their workloads in a public cloud, and 38% in a private cloud, according to the 2017 State of the Cloud Survey. This white paper offers strategies for mitigating the top 9 cloud threats with a cloud access security broker (CASB).
Posted: 19 Feb 2018 | Published: 19 Feb 2018

Oracle Corporation

DRaaS Ushers in Changes to Data Protection Strategy
sponsored by Carbonite
WHITE PAPER: What can DRaaS offer your organization? Download this white paper to find out, and to combat the high cost of downtime. Inside, you'll find 10 critical questions to ask any DRaaS provider, instruction on how to use DRaaS to support legacy platforms, and more.
Posted: 19 Feb 2018 | Published: 19 Feb 2018

Carbonite

Making the case for a cloud access security broker (CASB)
sponsored by Oracle Corporation
WHITE PAPER: CASBs are one of the fastest growing security technologies today. According to Gartner, by 2020, 85% of large enterprises will use a cloud access security broker for their cloud services. Explore this resource to learn about why CASBs are important for improving your cloud security and explore key cost considerations.
Posted: 19 Feb 2018 | Published: 19 Feb 2018

Oracle Corporation

Going big data? You need a cloud strategy
sponsored by Oracle Corporation
RESEARCH CONTENT: This Forrester Research report examines the current state of cloud big data analytics. From integration to security, learn about PaaS-based big data strategies, and explore the report's key findings about big data investment trends.
Posted: 19 Feb 2018 | Published: 31 Jan 2017

Oracle Corporation

8 Essential Secure Web Gateway Characteristics
sponsored by Symantec
WHITE PAPER: According to Symantec's Shadow Data Report, most CIOs think their organizations use around 30 to 40 cloud apps; in reality, the average number is 1,232. This resource offers 8 essential characteristics of secure web gateways to ensure effective cloud security.
Posted: 19 Feb 2018 | Published: 19 Feb 2018

Symantec
1 - 25 of 2638 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement