IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
151 - 175 of 2625 Matches Previous Page  |  Next Page
Report: Customer Identity and Access Management
sponsored by Janrain
RESOURCE: In this Forrester report, explore a 20-criteria evaluation of customer IAM providers to help security pros make the right choice for their digital business.
Posted: 06 Dec 2017 | Published: 15 Jun 2017

Janrain

SmartProtect Program: Solution Brief
sponsored by Corero Network Security
RESOURCE: To avoid damage to reputation and brand, organizations are looking for DDoS mitigation techniques that have evolved to meet the changing threat landscape. Take a look at this technology overview to decide if this DDoS protection strategy is right for your organization's network security needs.
Posted: 06 Dec 2017 | Published: 06 Dec 2017

Corero Network Security

Top Trends That Will Shape CIAM in 2018 and Beyond
sponsored by Janrain
WHITE PAPER: In order for digital businesses to manage, govern, and secure customers' access to systems and data without hurting the customer experience, businesses should implement a customer IAM strategy. This Forrester report details 12 key trends shaping the customer IAM landscape and how security and risk pros can respond to them in a productive manner.
Posted: 06 Dec 2017 | Published: 06 Dec 2017

Janrain

Executive Review: Consumer Identity and Access Management
sponsored by Janrain
WHITE PAPER: Consumer IAM is the fastest growing specialty in IAM that has emerged in the last few years to meet evolving business requirements. Explore this executive review to gain insight into consumer IAM and how it can help you improve your existing IAM and security strategy.
Posted: 05 Dec 2017 | Published: 05 Dec 2017

Janrain

Cloud-based backup services are a safety net in tricky times
sponsored by SearchDataBackup.com
EBOOK: Use this handbook to explore how cloud backup can help you better secure your information against ransomware, 5 critical questions to ask a cloud vendor before adopting, and the benefits merging your backup and disaster recovery services provides.
Posted: 05 Dec 2017 | Published: 05 Dec 2017

SearchDataBackup.com

Instaclustr Blackberry Case Study
sponsored by Instaclustr
CASE STUDY: Learn how BlackBerry deployed a NoSQL database for its IoT platform to handle data intake and application scaling requirements.
Posted: 04 Dec 2017 | Published: 04 Dec 2017


Extend DLP to the Cloud
sponsored by Symantec
RESOURCE: This solutions brief provides insight into a data loss prevention strategy combined with cloud access security broker in order to advance your cloud security posture.
Posted: 04 Dec 2017 | Published: 04 Dec 2017

Symantec

Top 10 Advantages of a Proxy Deployment in Conjunction with a NGFW
sponsored by Symantec
WHITE PAPER: While next-generation firewalls provide value to enterprises, they do not replace a secure web gateway technology. This white paper offers 10 advantages of a proxy deployment in conjunction with a next-generation firewall. Learn about how the two complement each other and can improve your security posture.
Posted: 04 Dec 2017 | Published: 04 Dec 2017

Symantec

5 Super Powers to Help You Master the Data Governance Universe
sponsored by Collibra
RESOURCE: Conquering data governance may seem like a superhuman task. But when you activate these five super powers, it gets a whole lot easier. Read this e-book to uncover why data governance isn't a technology problem, how to make sense of your data – and drive true value from it and what the biggest data governance challenge is (hint, it's not the data!).
Posted: 01 Dec 2017 | Published: 01 Dec 2017

Collibra

Fighting Against Authorized Push Payment (APP) Scams
sponsored by HID Global
WHITE PAPER: This blog post provides insight into authorized push payment scams and how your enterprise can reduce the number of fraudulent account takeovers by improving your identification and authentication mechanisms.
Posted: 30 Nov 2017 | Published: 21 Nov 2017

HID Global

Ten Steps for Successful Application Platforming in the Cloud
sponsored by Atos
WHITE PAPER: Most organizations are trying to copy the success of "cloud first," like Uber and Netflix, but doing so is a compllicated process that often lead to increased complexity that further slow necessary progress. This paper addresses this and explores ten tips for a successful digital transformation.
Posted: 30 Nov 2017 | Published: 31 Oct 2017

Atos

DDoS Trends Report
sponsored by Corero Network Security
RESEARCH CONTENT: In Q3 of 2017, Corero customers experienced an average of 237 DDoS attacks per month, which is an increase of 35% compared to Q2. This DDoS Attack Trends Report offers DDoS statistics, patterns, attack types, and key insights in order to help you protect your enterprise against these sophisticated attacks.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Corero Network Security

Turning DDOS from a Cost Center to a Revenue Generator
sponsored by Corero Network Security
EBOOK: According to IDC, worldwide spending on DDoS protection will reach over $1 billion by 2019. In this e-book, learn how to protect your organization from DDoS attacks, in addition to understanding how to gain a revenue opportunity.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Corero Network Security

Cybersecurity Trends: 2017 Spotlight Report
sponsored by Alert Logic
RESOURCE: According to the 2017 Spotlight Report, the 3 biggest obstacles to stronger cybersecurity are lack of skilled employees, lack of budget, and a lack of security awareness among employees. Explore this in-depth 72-page Spotlight Report to uncover top data points and trends in cybersecurity to help advance your company's security approach.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

Alert Logic

Achieve Security and Compliance in the Cloud Without Breaking the Bank
sponsored by Alert Logic
RESOURCE: Take a closer look at this infographic to uncover how IT professionals from 4 large sized companies implemented a security-as-a-service approach without breaking the bank.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

Alert Logic

Gamma International: The Macedonia files
sponsored by ComputerWeekly.com
RESOURCE: This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
Posted: 23 Nov 2017 | Published: 23 Nov 2017

ComputerWeekly.com

Data + Security = A Most Unvirtuous Relationship
sponsored by Delphix
RESOURCE: Learn about the emergence of DataOps as well as how different data security methodologies and tools are changing to handle modern threats to growing volumes of data and personal information.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

Delphix

FBI Cyber Squad Guest Speaking on Emerging Cyber Threats
sponsored by Digital Shadows
WEBCAST: Do you understand your data and susceptibility to being targeted? Watch this webcast to uncover emerging cyber threats, persistent vulnerabilities and strategies for protecting your enterprise.
Posted: 21 Nov 2017 | Premiered: Nov 21, 2017

Digital Shadows

Introducing the Delphix Dynamic Data Platform
sponsored by Delphix
VIDEO: IDC predicts that by 2025, worldwide data will grow to 163 ZB – majority being created and managed by enterprises. What does this mean for you now? This webcast discusses the need to rethink current data management approaches and access to data, which will require significant changes among people and processes.
Posted: 21 Nov 2017 | Premiered: 15 Nov 2017

Delphix

Step Up Your Security and Privacy with Data Masking
sponsored by Delphix
VIDEO: With data breaches occurring regularly, organizations are forced to better protect sensitive data across the enterprise. However, doing so and staying compliant is not an easy task, especially with new mandates like GDPR and HIPAA. This webcast explores how you can use data masking to keep data protected.
Posted: 20 Nov 2017 | Premiered: 15 Nov 2017

Delphix

Journey to GDPR
sponsored by IBM
WHITE PAPER: GDPR readiness is critical and a business necessity, but many organizations are struggling with the complex compliance requirements. This article provides information regarding GDPR as well as strategies to ensure you are compliant with the data processing rules.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

IBM

Damage Control: The Impact of Critical IT Incidents
sponsored by Splunk
WHITE PAPER: IT incidents result in annual costs running into millions of dollars, while the average organization is dealing with hundreds of incidents every week. This Quocirca research report analyzes the impact critical IT incidents have on organizations, which halt business processes and impact users.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Splunk

ROI Analysis: IBM BigFix Patch And BigFix Compliance
sponsored by IBM
WHITE PAPER: This Forrester report examines the potential ROI enterprises may gain by deploying IBM's BigFix Patch and BigFix Compliance. Uncover the security and cost benefits users saw with this implementation through real examples and experiences.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

IBM

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity

How can organizations get control over privileged identity management?
sponsored by One Identity
EGUIDE: Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
Posted: 20 Nov 2017 | Published: 14 Nov 2017

One Identity
151 - 175 of 2625 Matches Previous Page    5 6 7 8 9 10    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement