IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
201 - 225 of 2622 Matches Previous Page  |  Next Page
Equifax Breach: Lessons Learned for your Organization
sponsored by Digital Shadows
WHITE PAPER: The Equifax data breach potentially affected 143 million individuals in the US, Canada and the UK. Inside, gain insight into the impacts of the Equifax Breach, 6 lessons learned from the breach, and how your enterprise can mitigate the risks of falling victim to such a devastating data breach.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

Digital Shadows

A Comprehensive Guide to the Data Catalog
sponsored by Collibra
RESOURCE: Data is a valuable business asset with the potential to transform almost every aspect of the enterprise. To articulate business benefits, data catalogs can help organizations tap into the real value that data provides. Evaluate if you need a data catalog and how you can get started.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

Collibra

6 GDPR Compliance Pitfalls & How to Avoid Them
sponsored by Collibra
WHITE PAPER: The GDPR is a complex regulation. And on the path to compliance, there will be unanticipated roadblocks. The good news is, you can find your way through them.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

Collibra

Protecting Users and Data with Cloud Security
sponsored by Cisco Umbrella
EBOOK: What can you do to mitigate the risks associated with off-network access to sensitive data and applications? View this extensive resource collection, which offers 15+ resources, some from industry analysts and experts at 451 Research and Gartner.
Posted: 07 Nov 2017 | Published: 07 Nov 2017

Cisco Umbrella

Using Hyperconverged Infrastructure to Improve Data Protection and Recovery Effectiveness
sponsored by Hewlett Packard Enterprise
WHITE PAPER: IT organizations need to take a fresh look at their approach to data protection and availability, and move beyond the limitations of client/server era technologies. Access this IDC white paper to learn how hyperconverged infrastructure simplifies and improves data protection and recovery effectiveness.
Posted: 07 Nov 2017 | Published: 31 May 2017

Hewlett Packard Enterprise

Data and Analytics Secrets Revealed: A Collection of Customer Stories
sponsored by Splunk
EBOOK: Uncover a diverse variety of customer stories – from organizations like Ubisoft, Yelp, Equinix, Domino's, and Gatwick Airport – about how they turned data into one of their leading assets with enhanced analytics, data security, IoT, and big data capabilities.
Posted: 02 Nov 2017 | Published: 02 Nov 2017

Splunk

How to Shift Your Analytics Strategy to Keep Up with Industry Change
sponsored by Looker
WHITE PAPER: Actionable BI is critical for all organizations – but many lack the ability to analyze data quickly, comprehensively and effectively. Looking at healthcare, learn how embedded analytics tools that deliver self-service reporting capabilities can reduce barriers to success.
Posted: 02 Nov 2017 | Published: 02 Nov 2017

Looker

Introduction to Artificial Intelligence for Security Professionals
sponsored by Cylance
WHITE PAPER: According to Gartner, by 2018, 25% of security products used for detection will have some form of machine learning built into them. Explore this 155 page e-book to learn more about artificial intelligence and machine learning for security professionals.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

Cylance

10 Traits Of Successful DLP Programs
sponsored by InteliSecure
WHITE PAPER: According to Gartner, by 2018, 90% of organizations will implement at least one form of integrated DLP. This white paper reveals 10 traits of successful DLP programs to increase the effectiveness of your program.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

InteliSecure

Operationalize Your Organization for the GDPR
sponsored by InteliSecure
WHITE PAPER: Learn how creating a general data protection regulation framework to protect critical assets, both tangible and intangible (think IP), will enable you to operationalize your GDPR compliance.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

InteliSecure

5 Key Analytics and Machine Learning Takeaways
sponsored by Splunk
WHITE PAPER: Explore the top 5 analytics takeaways from Splunk's .conf2017 about everything from predictive analytics and machine data to threat intelligence.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

Splunk

Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

ComputerWeekly.com

Multi-factor Authentication for dummies
sponsored by iovation, Inc.
WHITE PAPER: The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

iovation, Inc.

Five Reasons to Reevaluate Your Current Backup Approach
sponsored by Acronis
WHITE PAPER: By downloading this resource, you'll discover 5 reasons you may need to reevaluate your current backup approach. Read on to see a platform that enables instant recovery from ransomware, supports all major hypervisors, and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Acronis

The Race to Readiness
sponsored by Citrix
WHITE PAPER: According to a study conducted by Verizon, 63% of security breaches involve weak or stolen credentials. This white paper offers 4 steps and explanations to getting a head start on GDPR data security to help your enterprise protect against breaches.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Citrix

Case Study: Quadruple Backup Speed and Blocks Ransomware Attacks with Backup Platform
sponsored by Acronis
CASE STUDY: This case study explores how Johnson Electric, one of the world's largest electrical providers, protected their organization against ransomware targeting their large amount of data.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Acronis

How Cloud is Reshaping Digital ECM Strategies
sponsored by Citrix
EGUIDE: In this expert e-guide, we explore some of the new and evolving trends in cloud-based ECM. Discover how to prioritize the capabilities that matter most to your content management strategy and weigh considerations like on-prem vs. cloud deployments, AI capabilities, advanced collaboration tools, security, and more.
Posted: 24 Oct 2017 | Published: 19 Oct 2017

Citrix

Balancing ECM User Experiences with IT Control and Security
sponsored by Citrix
EGUIDE: In this expert e-guide, we explore how you can deliver quality ECM user experiences without sacrificing IT control or security. Learn how to strike the balance and discover 7 features that help you deliver a better user experience.
Posted: 24 Oct 2017 | Published: 19 Oct 2017

Citrix

A Secure, IT-Approved File Sharing Alternative to Shadow IT
sponsored by Citrix
WHITE PAPER: Discover how to mitigate the security risks and Shadow IT issues associated with online file sharing services. Find out how to protect your data while still enabling employees to be productive, and uncover 5 ways to identify and eliminate Shadow IT that results from unauthorized file sharing accounts.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Citrix

7 Requirements for an Effective EFSS Platform
sponsored by Citrix
WHITE PAPER: Discover how to make sure you enterprise file sync and sharing (EFSS) offers the flexibility that users need without sacrificing security. Learn how to mitigate the risks associated with personal file-sharing services and uncover 7 key requirements for a sound EFSS platform.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

Citrix

New Cybersecurity Regulations Adopted to Protect Financial Systems & Information
sponsored by HID Global
WHITE PAPER: According to the Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Explore this white paper to discover how to protect your organization from data breaches.
Posted: 23 Oct 2017 | Published: 13 Oct 2017

HID Global

Dutch Service Provider Gets a Total IT Refresh from the Ground Up
sponsored by Hewlett Packard Enterprise
CASE STUDY: Syntrophos provides high-quality information and communication technology, geo-information, and consulting services to over 120,000 citizens. Read this case study to learn how adopting a hyperconverged infrastructure enabled them to address these issues and refresh their IT infrastructure to support Tier-1 applications.
Posted: 10 Nov 2017 | Published: 30 Jun 2017

Hewlett Packard Enterprise

Migrating IT In-house Boosts Management and Control with HCI
sponsored by Hewlett Packard Enterprise
CASE STUDY: When Namibia Institute of Pathology Limited brought their IT in-house, they needed a high-power data center. This case study explores how they implemented a hyperconverged infrastructure that helped them acquire brand-new disaster recovery, backup, and single-pane management capabilities.
Posted: 09 Nov 2017 | Published: 31 Aug 2017

Hewlett Packard Enterprise

Data Protection on HCI Platforms
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Data protection is critical for disaster recovery and business continuity, and is one of the key evaluation markers for organizations purchasing IT infrastructure. This paper discusses HCI's impact on data protection, key factors to consider, data protection best practices and recommendations on when and how to use them for various use cases.
Posted: 07 Nov 2017 | Published: 30 Jun 2017

Hewlett Packard Enterprise

How to Secure Your Data and Protect Your Bottom Line
sponsored by IBM
WHITE PAPER: New technology trends, including cloud, mobile and big data, create opportunities for your enterprise to exploit analytic insights. But the same things that enable these opportunities can skyrocket your risks if proper data security and governance controls aren't in place. Learn how you can protect your data to avoid risk.
Posted: 03 Nov 2017 | Published: 03 Nov 2017

IBM
201 - 225 of 2622 Matches Previous Page    7 8 9 10 11 12    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement