IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
51 - 75 of 2700 Matches Previous Page  |  Next Page
GDPR: Not Just Compliance
sponsored by DXC
WHITE PAPER: GDPR presents a great opportunity for improved customer experience, deeper customer engagement, and increased sales. Explore this resource to learn more about how GDPR goes beyond simple compliance standards and can offer a greater benefit to your organization.
Posted: 05 Apr 2018 | Published: 05 Apr 2018

DXC

Helping Address GDPR Compliance
sponsored by Oracle Cloud
WHITE PAPER: This white paper explores how to address GDPR with a coordinated strategy built to identify threats, reduce risk, and maintain continuous compliance. Learn about a variety of security tools, stationed both on-premise and in the cloud, that are designed to help you discover, monitor, and encrypt sensitive data.
Posted: 05 Apr 2018 | Published: 31 Jul 2017

Oracle Cloud

Get your Content Management System GDPR-Ready
sponsored by Box
EGUIDE: In this expert e-guide, we explore how to maintain compliance for your critical content in the cloud. Uncover vendor-agnostic compliance tips from Box compliance president Crispen Maung for your content management system.
Posted: 04 Apr 2018 | Published: 30 Mar 2018

Box

Addressing User Data Risks in a Distributed Data World
sponsored by Druva Software
RESOURCE: With the EU's GDPR regulations ready to strike with stiff penalties for violators, businesses need a data governance policy that can keep them safe. Download this resource to discover a new approach to data governance.
Posted: 04 Apr 2018 | Published: 31 Dec 2016

Druva Software

A Buyer's Guide to Online Identity Verification
sponsored by Jumio
WHITE PAPER: Because of cybercriminals and routine data breaches, trust is in increasingly short supply. This resource reveals how to evaluate vendors in the emerging trusted identity as a service space.
Posted: 04 Apr 2018 | Published: 04 Apr 2018

Jumio

A Practical Guide for GDPR Compliance
sponsored by Druva Software
WHITE PAPER: The GDPR demands significant data protection safeguards to be implemented by organizations. The time to get ready is now, as the consequences of getting it wrong are significant. Explore this Osterman Research white paper to uncover a practical guide for GDPR compliance.
Posted: 03 Apr 2018 | Published: 03 Apr 2018

Druva Software

Enterprise DNS Security
sponsored by Infoblox
WHITE PAPER: According to an ESG research report, 72% of organizations believe cybersecurity operations have become significantly more difficult over the past 2 years. Explore this white paper to gain insight into enterprise DNS security, its benefits and what to expect for the future of cybersecurity.
Posted: 02 Apr 2018 | Published: 02 Apr 2018

Infoblox

Vendor Comparison: The Top Enterprise File Sync and Share Platforms
sponsored by Citrix
RESEARCH CONTENT: From Microsoft to Citrix, uncover a 37-criterion evaluation from Forrester Research of several of the leading enterprise file sync and share (EFSS) platforms to help you make an informed decision about which one suits your business best.
Posted: 02 Apr 2018 | Published: 12 Dec 2017

Citrix

2018 Cybersecurity Report
sponsored by Cisco & Dimension Data
RESOURCE: Defenders should prepare to face new, self-propagating, network-based threats in 2018. Explore this 68-page cybersecurity report to uncover what to expect in 2018 and how to augment your current security approach to protect against the modern day threats.
Posted: 02 Apr 2018 | Published: 02 Apr 2018

Cisco & Dimension Data

Customer Trust Under GDPR
sponsored by DXC
WHITE PAPER: The GDPR is the most important overhaul of data privacy in 20 years. Access this resource to gain insight into preparing your organization's data for GDPR compliance.
Posted: 30 Mar 2018 | Published: 30 Mar 2018

DXC

Webinar: How to Migrate Sensitive Records to AWS
sponsored by AWS - Logicworks
WEBCAST: Migrating sensitive data to the cloud is becoming unavoidable. You'll want to make sure it's done securely, especially with GDPR's stiff financial penalties looming. Register for this webinar taking place on May 1, 2018 to learn how to migrate sensitive data to Amazon Web Services (AWS).
Posted: 30 Mar 2018 | Premiered: Mar 30, 2018

AWS - Logicworks

Mobile and Cloud: Shaping your Content Security
sponsored by Adobe Systems, Inc.
EGUIDE: In this e-guide, we explore how to manage sensitive content and documents, wherever they exist. Get tips about your content security options from experts like Forrester Research's Rick Holland, and learn about the potential benefits of mobile document management systems.
Posted: 29 Mar 2018 | Published: 26 Mar 2018

Adobe Systems, Inc.

The Flawed Five: Your Guide to Insider Contact Center Cybersecurity Threats
sponsored by Semafone
WHITE PAPER: Credit card numbers, user IDs, and passwords are worth a great deal on the black market. Take a look at this resource to discover 5 types of hackers posing security risks to your contact centers.
Posted: 29 Mar 2018 | Published: 29 Mar 2018

Semafone

Transforming Security in the Mobile Cloud Era
sponsored by VMware
WHITE PAPER: Malicious attacks have adapted and become more sophisticated, making it more difficult for organizations to prevent them. Take a look at this resource to learn how to protect your data, improve agility and stay compliant in the mobile cloud era.
Posted: 29 Mar 2018 | Published: 29 Mar 2018

VMware

2018 Annual Cybersecurity Report
sponsored by Cisco Umbrella
WHITE PAPER: Defenders should prepare to face new, self-propagating, network-based threats in 2018. Explore this 68-page cybersecurity report to uncover what to expect in 2018 and how to augment your current security approach to protect against the modern day threats.
Posted: 28 Mar 2018 | Published: 28 Mar 2018

Cisco Umbrella

Enabling Cybersecurity in the Age of Digital Transformation
sponsored by VMware
RESEARCH CONTENT: The aspects of digital transformation are changing enterprise IT, enabling greater business agility, but also creating a new set of cybersecurity challenges. This resource explores the impact of digital transformation on cybersecurity processes and technologies and offers strategies for securing modern enterprise IT.
Posted: 28 Mar 2018 | Published: 28 Mar 2018

VMware

Data Privacy & Security
sponsored by Delphix
RESOURCE: With data breach incidents constantly hitting the headlines, organizations must protect sensitive data across the enterprise. Explore this resource to uncover a comprehensive approach to data privacy and security to ensure your organization is not the next one in the news.
Posted: 27 Mar 2018 | Published: 27 Mar 2018

Delphix

Data Risk Management Barometer
sponsored by Dell EMC and Intel®
RESOURCE: From data privacy to data sovereignty, the challenges of keeping data both secure and available are often subject to regulation. This IDC resource explores the data privacy legislation in the Asia-Pacific region to give you a better understanding of data privacy principles, challenges, risks, and best practices.
Posted: 27 Mar 2018 | Published: 27 Mar 2018

Dell EMC and Intel®

7 Reasons Why Micro-Segmentation is Powerful
sponsored by VMware
WHITE PAPER: With attacks on the data center increasing, how does your enterprise plan to remain secure? Take a look at this resource to uncover 7 reasons utilizing micro-segmentation is important to improving data center security.
Posted: 26 Mar 2018 | Published: 26 Mar 2018

VMware

Application-Centric Security
sponsored by VMware
WHITE PAPER: The digital economy has made users and endpoints multiply, giving cybercriminals a great deal of opportunity to carry out malicious attacks. Explore this resource to uncover a strategy that builds protection into the DNA of the digital infrastructure.
Posted: 26 Mar 2018 | Published: 26 Mar 2018

VMware

Residency Services for Data Protection
sponsored by Dell EMC and Intel®
RESOURCE: Developing a comprehensive data protection strategy is a key priority for organizations looking to manage explosive data growth. Access this resource to uncover how to optimize your data protection technology.
Posted: 26 Mar 2018 | Published: 26 Mar 2018

Dell EMC and Intel®

The Printer is an Endpoint: Proactively Addressing the Security Vulnerability
sponsored by HP
WHITE PAPER: Attackers seize on the lack of attention given to printer security relative to other devices and peripherals on enterprise networks. This IDC resource highlights the vulnerable nature of printers in enterprise networks and provides steps to reduce the risk they pose to the business.
Posted: 26 Mar 2018 | Published: 26 Mar 2018

HP

7 Ways to Improve Data Center Security
sponsored by VMware
WHITE PAPER: As attacks on the data center increase, security must increase as well. Take a look at this resource to discover 7 reasons leveraging micro-segmentation is critical to improving data center security.
Posted: 26 Mar 2018 | Published: 26 Mar 2018

VMware

Data Masking & Security
sponsored by Delphix
RESOURCE: With data breach incidents regularly making the news, organizations must protect sensitive data across the enterprise. Access this resource to learn how the Delphix Dynamic Data Platform can help you ensure privacy, security and regulatory compliance.
Posted: 26 Mar 2018 | Published: 26 Mar 2018

Delphix

Secure Data Acquisition, Communication and Processing for Your IoT Solutions
sponsored by Telit
WHITE PAPER: This white paper explores the 3 pillars of IoT network security and offers advice on how you can overcome the impending cybersecurity threats while maintaining the agility you need to gain a competitive advantage.
Posted: 23 Mar 2018 | Published: 23 Mar 2018

Telit
51 - 75 of 2700 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement