IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by, powered by an online computer dictionary
Data Security Reports
226 - 250 of 2701 Matches Previous Page  |  Next Page
Banking on Cybersecurity
sponsored by HyTrust
WHITE PAPER: According to PWC's Global Economic Crime Survey, cybercrime has jumped to the second-most reported economic crime and financial organizations are prime targets. This white paper offers best practices to strengthen data security and regulatory compliance in financial services.
Posted: 11 Dec 2017 | Published: 11 Dec 2017


Effective Isolation and Workload Security in the Multi-Tenant Cloud
sponsored by HyTrust
RESOURCE: A major challenge for multi-tenant cloud environments is the lack of access control or infrastructure segmentation required for effective isolation of critical workloads. This product overview offers a cloud security strategy that will help you mitigate the challenges of effectively securing cloud environments.
Posted: 08 Dec 2017 | Published: 08 Dec 2017


Security Solutions for Public Sector Virtual Infrastructure
sponsored by HyTrust
RESOURCE: Explore this product overview to evaluate if this cloud security strategy, which secures critical environments in the cloud, is right for your organization's needs.
Posted: 08 Dec 2017 | Published: 08 Dec 2017


Revolutionizing the Sharing Economy
sponsored by Evident
WHITE PAPER: According to the U.S. Department of Commerce, the sharing economy has the potential to increase to $335 billion by 2025. Take a look at this resource to uncover a security strategy for the sharing economy that can help advance identity and verification while allowing users to securely share personal data.
Posted: 06 Dec 2017 | Published: 06 Dec 2017


Revolutionizing the Sharing of Personal Data
sponsored by Evident
WHITE PAPER: The average number of records stolen in a data breach is 24,089, according to IBM Security. This resource provides information into securing personal, sensitive data to minimize the risks of a data hack in order to protect your business.
Posted: 05 Dec 2017 | Published: 05 Dec 2017


Cloud Essentials: Better Security Within the Cloud
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: According to Crowd Research Partners, 91% of organizations have security concerns about adopting the cloud and only 14% believe traditional security is enough. Explore this white paper to uncover strategies for implementing a secure cloud platform by safeguarding all aspects of the cloud including technology, processes and people.
Posted: 04 Dec 2017 | Published: 04 Dec 2017

Oracle Corporation UK Ltd

Instaclustr Blackberry Case Study
sponsored by Instaclustr
CASE STUDY: Learn how BlackBerry deployed a NoSQL database for its IoT platform to handle data intake and application scaling requirements.
Posted: 04 Dec 2017 | Published: 04 Dec 2017

Extend DLP to the Cloud
sponsored by Symantec
RESOURCE: This solutions brief provides insight into a data loss prevention strategy combined with cloud access security broker in order to advance your cloud security posture.
Posted: 04 Dec 2017 | Published: 04 Dec 2017


Top 10 Advantages of a Proxy Deployment in Conjunction with a NGFW
sponsored by Symantec
WHITE PAPER: While next-generation firewalls provide value to enterprises, they do not replace a secure web gateway technology. This white paper offers 10 advantages of a proxy deployment in conjunction with a next-generation firewall. Learn about how the two complement each other and can improve your security posture.
Posted: 04 Dec 2017 | Published: 04 Dec 2017


How to Get More Personal Data Without the Risk
sponsored by Evident
WEBCAST: According to Continuum, 3.7 million personal data records are stolen every day. Take an in-depth look at this webinar to gain insight into the worsening security problem facing enterprises today, the concern about safety of personal data, and tips for choosing a verification partner.
Posted: 01 Dec 2017 | Premiered: Dec 1, 2017


5 Super Powers to Help You Master the Data Governance Universe
sponsored by Collibra
RESOURCE: Conquering data governance may seem like a superhuman task. But when you activate these five super powers, it gets a whole lot easier. Read this e-book to uncover why data governance isn't a technology problem, how to make sense of your data – and drive true value from it and what the biggest data governance challenge is (hint, it's not the data!).
Posted: 01 Dec 2017 | Published: 01 Dec 2017


Fighting Against Authorized Push Payment (APP) Scams
sponsored by HID Global
WHITE PAPER: This blog post provides insight into authorized push payment scams and how your enterprise can reduce the number of fraudulent account takeovers by improving your identification and authentication mechanisms.
Posted: 30 Nov 2017 | Published: 21 Nov 2017

HID Global

How to Avoid Being the Victim of a Data Breach
sponsored by Evident
WEBCAST: There are 3.8 million data records stolen every day, according to Continuum. No businesses are safe, so how can you stay ahead of hackers? This webcast offers insight into what is driving the growth of security breaches, the top causes of data breaches such as malware and phishing, and 3 steps to take when protecting personal data.
Posted: 30 Nov 2017 | Premiered: Nov 30, 2017


Ten Steps for Successful Application Platforming in the Cloud
sponsored by Atos
WHITE PAPER: Most organizations are trying to copy the success of "cloud first," like Uber and Netflix, but doing so is a compllicated process that often lead to increased complexity that further slow necessary progress. This paper addresses this and explores ten tips for a successful digital transformation.
Posted: 30 Nov 2017 | Published: 31 Oct 2017


Cybersecurity Trends: 2017 Spotlight Report
sponsored by Alert Logic
RESOURCE: According to the 2017 Spotlight Report, the 3 biggest obstacles to stronger cybersecurity are lack of skilled employees, lack of budget, and a lack of security awareness among employees. Explore this in-depth 72-page Spotlight Report to uncover top data points and trends in cybersecurity to help advance your company's security approach.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

Alert Logic

Gamma International: The Macedonia files
sponsored by
RESOURCE: This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
Posted: 23 Nov 2017 | Published: 23 Nov 2017

FBI Cyber Squad Guest Speaking on Emerging Cyber Threats
sponsored by Digital Shadows
WEBCAST: Do you understand your data and susceptibility to being targeted? Watch this webcast to uncover emerging cyber threats, persistent vulnerabilities and strategies for protecting your enterprise.
Posted: 21 Nov 2017 | Premiered: Nov 21, 2017

Digital Shadows

Introducing the Delphix Dynamic Data Platform
sponsored by Delphix
VIDEO: IDC predicts that by 2025, worldwide data will grow to 163 ZB – majority being created and managed by enterprises. What does this mean for you now? This webcast discusses the need to rethink current data management approaches and access to data, which will require significant changes among people and processes.
Posted: 21 Nov 2017 | Premiered: 15 Nov 2017


Journey to GDPR
sponsored by IBM
WHITE PAPER: GDPR readiness is critical and a business necessity, but many organizations are struggling with the complex compliance requirements. This article provides information regarding GDPR as well as strategies to ensure you are compliant with the data processing rules.
Posted: 20 Nov 2017 | Published: 20 Nov 2017


Compare the top enterprise file-sync-and-sharing vendors
sponsored by Insight
EGUIDE: Enterprise file sync-and-sharing allows for simpler file access and sharing on the consumer and business level, but with so many vendors in the market it can be difficult to compare options. Download this e-guide to learn about the different capabilities of various vendors and what they can do for your mobile EFSS needs.
Posted: 12 Dec 2017 | Published: 08 Dec 2017


Executing a Lockdown on Cybersecurity Threats
sponsored by Navex Global
EBOOK: Cybersecurity preparedness and keeping up with the latest developments in security is essential in protecting your organization. This e-book addresses tactics to mitigate risks of cybersecurity threats and offers strategies to take if your organization has been attacked.
Posted: 08 Dec 2017 | Published: 08 Dec 2017

Navex Global

Cloud-based backup services are a safety net in tricky times
sponsored by
EBOOK: Use this handbook to explore how cloud backup can help you better secure your information against ransomware, 5 critical questions to ask a cloud vendor before adopting, and the benefits merging your backup and disaster recovery services provides.
Posted: 05 Dec 2017 | Published: 05 Dec 2017

ROI Analysis: IBM BigFix Patch And BigFix Compliance
sponsored by IBM
WHITE PAPER: This Forrester report examines the potential ROI enterprises may gain by deploying IBM's BigFix Patch and BigFix Compliance. Uncover the security and cost benefits users saw with this implementation through real examples and experiences.
Posted: 21 Nov 2017 | Published: 21 Nov 2017


How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity

How can organizations get control over privileged identity management?
sponsored by One Identity
EGUIDE: Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
Posted: 20 Nov 2017 | Published: 14 Nov 2017

One Identity
226 - 250 of 2701 Matches Previous Page    8 9 10 11 12 13    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement