IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
26 - 50 of 1998 Matches Previous Page  |  Next Page
4 Ways SailPoint Predictive Identity Puts You in Control
sponsored by SailPoint Technologies
WHITE PAPER: As digital transformation continues to reshape today’s modern enterprise, it is vital that organizations keep focus on protecting and securing their data, no matter where it resides. In this white paper, learn 4 key ways that SailPoint Predictive Identity can help your organization by putting you in control.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

SailPoint Technologies

Market Guide for Cloud Workload Protection Platforms
sponsored by Trend Micro
ANALYST REPORT: Most enterprises will have workloads to protect distributed across a combination of on-premises, colocation and multiple public cloud IaaS platforms. In this Gartner Market Guide, learn how Cloud Workload Protection Platforms can help provide enterprises with a way to protect hybrid, multicloud workloads and provide consistent visibility.
Posted: 12 Mar 2020 | Published: 08 Apr 2019

Trend Micro

Data-Centric Protection Explained
sponsored by Comforte AG
EBOOK: Open up this 25-page eBook to learn about the guiding principles behind data-centric protection methodologies, and discover data-centric best practices for encryption, data masking, hashing, tokenization, and more.
Posted: 11 Mar 2020 | Published: 11 Mar 2020

Comforte AG

Qubole on Amazon AWS
sponsored by Qubole
WHITE PAPER: In a world characterized by increasingly strict consumer data laws and increasingly aggressive cybercriminals, it’s important to know that your cloud data platform is secure and acting with propriety. Read this white paper to learn how Qubole focuses on protecting their client data within the AWS ecosystem.
Posted: 10 Mar 2020 | Published: 06 Mar 2018

Qubole

New AWS Backup from Veeam
sponsored by Veeam Software
WEBCAST: Although AWS provides the platform, users need to protect and secure it. Explore this webcast to discover how protect your AWS data today so you can overcome any cloud data loss scenario, with a cloud-native, cost-effective, and secure backup solution.
Posted: 09 Mar 2020 | Premiered: Feb 14, 2020

Veeam Software

O365 Backup for Dummies
sponsored by Veeam Software
EBOOK: By educating yourself on elements like business continuity, data protection, and data loss, you and your organization can stay ahead of digital threats. Check out this 6-chapter e-book to find out how to manage and safeguard your Office 365 data, understand data loss in the cloud, and choose a third-party backup solution to fit your needs.
Posted: 09 Mar 2020 | Published: 09 Mar 2020

Veeam Software

The CCPA: Security Standards and Measures to Comply
sponsored by Crosskey Cyber Security
RESOURCE: The CCPA is now operative and the Attorney General can begin enforcement actions against businesses on July 1 of this year. Even if you believe you are not subject to the CCPA, it is a good idea for SMBs to comply with the standard for many reasons. In this blog, learn about the cybersecurity standard SMBs need to meet to satisfy the CCPA.
Posted: 05 Mar 2020 | Published: 05 Mar 2020

Crosskey Cyber Security

AI For Credit Risk
sponsored by Brighterion
WEBCAST: Getting AI of the ground in the first place can be intimidating—not to mention thedata,, process governance, and ROI obstacles you’ll inevitably face. Watch this webcast to hear how AI Express gets customers over the AI adoption hurdle, and uncover imaginative FI use cases that organizations can leverage to improve their business
Posted: 05 Mar 2020 | Premiered: Mar 5, 2020

Brighterion

Operationalizing Privacy Policy from Discovery to Enforcement
sponsored by Ionic Security
WEBCAST: In this webinar, join security experts at BigID and Ionic as they discuss how automating the identification and mitigation of risk to consumer data can help organizations meet the requirements of data privacy laws that require extensive audit trails, like GDPR and CCPA. Watch now to learn more.
Posted: 05 Mar 2020 | Premiered: Mar 5, 2020

Ionic Security

How to Apply Privacy Rules to Your Company's Advantage
sponsored by DMI Inc
WHITE PAPER: Why should we be grateful for legislations like the California Consumer Protection Act (CCPA) and Europe’s General Data Protection Regulation (GDPR)? In this e-book, explore the unexpected upsides in privacy regulations.
Posted: 04 Mar 2020 | Published: 04 Mar 2020

DMI Inc

Implementing Privacy Policy: Application Security the Easy Way
sponsored by Ionic Security
WEBCAST: The fundamental issue with data protection is that security is often siloed, but sensitive data isn’t, leaving apps and data at risk. This webcast takes a closer look at Ionic Machina, which focuses on data protection through scalability, visibility, and access management controls. Watch now to learn more.
Posted: 04 Mar 2020 | Premiered: Mar 4, 2020

Ionic Security

HC3 Data Protection Suite: Making Sure Your Data is Always Protected
sponsored by Scale Computing
DATA SHEET: HC3 Data Protection uses self-healing automation to keep workloads online even when encountering failures in both hardware and software components. Access this datasheet to discover the 7 key features of the HC3 Data Protection Suite, which are all geared towards making sure your data is always protected
Posted: 03 Mar 2020 | Published: 03 Mar 2020

Scale Computing

Scaling Your Data Privacy Program
sponsored by Ionic Security
RESOURCE: The changing regulations are making it critical for organizations to address privacy from an on-going and holistic perspective. Read this blog from Ionic Security to learn how to scale your data privacy program today.
Posted: 02 Mar 2020 | Published: 02 Mar 2020

Ionic Security

Evaluating Vendor Risk Management
sponsored by Atlassian
WHITE PAPER: As organizations continue to adopt cloud services, assessing the security risk of each service through a standardized evaluation process becomes critical to preventing data breaches. This guide is designed to help your organization develop a security risk scoring system to evaluate potential risks. Download the guide to learn more.
Posted: 02 Mar 2020 | Published: 02 Mar 2020

Atlassian

CW Europe - March-May 2020: Experts examine Dutch government’s IT problems
sponsored by ComputerWeekly.com
EZINE: Technology experts discuss the challenges and potential solutions to the Netherlands government's IT problems.
Posted: 02 Mar 2020 | Published: 12 Mar 2020

ComputerWeekly.com

Best Practices for Data Privacy Programs
sponsored by Ionic Security
WHITE PAPER: View Ionic Security’s Practitioner Guide that offers guidance for enabling “privacy by default and by design” no matter where your organization falls within its unique security and privacy maturity lifecycle.
Posted: 28 Feb 2020 | Published: 28 Feb 2020

Ionic Security

The AI Impact Survey Insights from More than 400 Data Professionals
sponsored by Dataiku
WHITE PAPER: Many data professionals have strong opinions about the ways in which AI will impact their industries, companies, and roles—but not all these opinions align with reality. Read this white paper to learn how data professionals expect AI to change their industry, as well as how to integrate these predictions into your business strategy.
Posted: 28 Feb 2020 | Published: 28 Feb 2020

Dataiku

Implementing Privacy Policy: Scaling Your Data Privacy Program
sponsored by Ionic Security
VIDEO: View this Ionic Security demo to see scalable and consistent data protection in action ⁠— through the lens of a custom HR app.
Posted: 27 Feb 2020 | Premiered: 27 Feb 2020

Ionic Security

A Mandate to Execute a New Data Security Strategy
sponsored by Ionic Security
VIDEO: In this video panel, join Ionic Security experts as they discuss the age of rapidly increasing digital threats, the importance of a data-centric approach to security, the impacts of GDPR, and more.
Posted: 27 Feb 2020 | Premiered: 27 Feb 2020

Ionic Security

Digital Transformation: Market Opportunity & Threats for MSPs
sponsored by PortSys
RESOURCE: In 2019, at least 13 managed service providers (MSPs) were compromised by ransomware. MSPs remain attractive targets for hackers, which will likely lead to a rise in breach attempts. So, can MSPs be trusted as secure partners? This blog post breaks down the market opportunity and potential security risk for MSPs.
Posted: 27 Feb 2020 | Published: 19 Feb 2020

PortSys

Follow 4 Data Science Best Practices to Achieve Project Success
sponsored by Dataiku
ANALYST REPORT: Data science and machine learning initiatives (DSML) have exploded in popularity, yet many of these projects have surprising poor results despite continued investment. Read this Gartner report to learn the best practices that will help your data science program see sustained success and provide your organization with real insights.
Posted: 26 Feb 2020 | Published: 06 Jan 2020

Dataiku

Data Science for Everyone
sponsored by TIBCO
WHITE PAPER: Data science is often misconstrued as only relevant to those with multiple degrees and remarkable knowledge of code, data, and analysis. Yet, data science is becoming increasingly useful and accessible to all employees. Check out this resource to see just how accessible data science is, and how to take advantage of it in your organization.
Posted: 26 Feb 2020 | Published: 25 Dec 2019

TIBCO

Supply Chain Security for the Cloud: Data Protection Standards
sponsored by Ionic Security
RESOURCE: When it comes to securing data in the cloud; should the provider be responsible, the user, or should they share responsibility? This question often goes unanswered, exposing organizations to cyberattacks. In this blog post, discover how to assign clear security responsibilities in order to protect your data and meet compliance standards.
Posted: 26 Feb 2020 | Published: 04 Dec 2019

Ionic Security

Disaster Recovery Planning Ahead
sponsored by OffSiteDataSync and Veeam
EBOOK: A disaster recovery plan will help your organization resume business operations within an acceptable timeframe should an outage or emergency occur. Access this e-book to learn why disaster recovery plans are necessary for businesses of all sizes and get guidance for putting your plan into action.
Posted: 26 Feb 2020 | Published: 26 Feb 2020

OffSiteDataSync and Veeam

Absolute Maximizes Klein Independent School District One-to-One Program
sponsored by Absolute Software Corporation
CASE STUDY: Learn how Absolute allowed the Klein Independent School District (ISD), of Texas to deploy a successful one-to-one computing program with student device security and privacy.
Posted: 26 Feb 2020 | Published: 26 Feb 2020

Absolute Software Corporation
26 - 50 of 1998 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info