IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
1 - 25 of 1828 Matches Previous Page  |  Next Page
Classification Review “A Good Human Plus A Machine Is The Best Combination”
sponsored by Dathena
WHITE PAPER: By partnering AI solutions with human expertise and judgement, data classification shortcomings can be surmounted. Read on to learn how Dathena leverages AI to improve the quality of classification, with its mechanism evolving over time alongside your own data.
Posted: 22 Jul 2021 | Published: 22 Jul 2021

Dathena

Computer Weekly - 29 June 2021: Is the UK government planning to rewrite GDPR?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, a government taskforce on post-Brexit regulations has recommended changes to GDPR in the UK – we examine the implications. The NHS has launched a new data strategy - we look at what it means for your medical records. And we ask how to avoid the performance problems that affect private cloud. Read the issue now.
Posted: 25 Jun 2021 | Published: 29 Jun 2021

ComputerWeekly.com

Data Security Platform Solution Brief
sponsored by Comforte AG
RESOURCE: With Comforte SecurDPS platform, your organization can gain a unique and powerful perspective for planning privacy compliance, implementing cloud migrations, and then measuring your breach risks in a quantitative manner. Access this solution brief to learn more about the benefits of Comforte SecurDPS platform.
Posted: 07 Jun 2021 | Published: 07 Jun 2021

TOPICS:  Data Security
Comforte AG

Let's Talk About Data Security for Cloud & PII
sponsored by Comforte AG
WHITE PAPER: Comforte's data security platform secures all your sensitive data and information intended for applications using standard protocols, especially useful for aaS applications. Access this PDF to learn more about data-centric security and the benefits of Comforte's data security platform.
Posted: 04 Jun 2021 | Published: 04 Jun 2021

TOPICS:  Data Security
Comforte AG

The Behavior-Based Approach to Data Protection
sponsored by Forcepoint
WEBCAST: Learn how Risk-Based DLP balances employee productivity with providing effective breach protection.
Posted: 03 Jun 2021 | Premiered: Jun 3, 2021

TOPICS:  Data Security
Forcepoint

Risk-Adaptive Data Protection: The behavior-based approach
sponsored by Forcepoint
EBOOK: Learn how Risk-Adaptive DLP goes beyond traditional solutions to meet the needs of your expanded ecosystem.
Posted: 03 Jun 2021 | Published: 03 Jun 2021

TOPICS:  Data Security
Forcepoint

Computer Weekly - 1 June 2021: The technology that enabled Covid-19 genome sequencing success
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the scientists behind the UK's gene sequencing work during the coronavirus pandemic to find out how cloud and data analytics enabled their success. It's three years since GDPR entered into law – we assess its progress. And we examine low-code software development for a small business. Read the issue now.
Posted: 27 May 2021 | Published: 01 Jun 2021

ComputerWeekly.com

Computer Weekly - 25 May 2021: Making data an asset, not a threat
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the latest developments in the UK government's National Data Strategy and what it means for the economy. Our latest buyer's guide explains the emerging technologies around computational storage. And we look at the advances in customer experience management during the pandemic. Read the issue now.
Posted: 24 May 2021 | Published: 25 May 2021

ComputerWeekly.com

Zero-trust Implementation Begins With Choosing an On-Ramp
sponsored by Thales
EBOOK: PH
Posted: 14 May 2021 | Published: 14 May 2021

TOPICS:  Data Security
Thales

CPRA Compliance Creates Complications for IT Ops
sponsored by Thales
EBOOK: PH
Posted: 14 May 2021 | Published: 14 May 2021

TOPICS:  Data Security
Thales

Comparing Data Protection vs. Data Security vs. Data Privacy
sponsored by Thales
EBOOK: PH
Posted: 14 May 2021 | Published: 14 May 2021

TOPICS:  Data Security
Thales

Data-as-as-Service solves traditional security problems
sponsored by HammerSpace
PODCAST: Join Jon McLachlan, host of The Security Podcast of Silicon Valley, as he sits down with Anand Ganesh, Founding Software Architect at Hammerspace, to discuss how storageless data and Data-as-as-Service solve traditional B2B data protection and security problems like encrypting data at rest.
Posted: 14 May 2021 | Premiered: May 6, 2021

HammerSpace

Executive Interview: Unleashing blockchain's potential
sponsored by ComputerWeekly.com
EGUIDE: Labrys founder and CEO Lachlan Feeney offers his observations about blockchain adoption in Australia, and what his firm is doing to help organisations unleash the full potential of the technology.
Posted: 13 May 2021 | Published: 14 May 2021

ComputerWeekly.com

CW Innovation Awards: NUHS taps RPA in Covid-19 swab tests
sponsored by ComputerWeekly.com
EGUIDE: In this case study, learn how Singapore's National University Health System deployed RPA bots to automate patient registration during Covid-19 swab tests as part of broader efforts to improve efficiency.
Posted: 11 May 2021 | Published: 11 May 2021

ComputerWeekly.com

Building a Strong Foundation for Data Privacy and Security
sponsored by Thales
EBOOK: Take a quick survey to access a PDF download to learn about Thales CipherTrust Data Discovery and Classification, which allows you to easily uncover and mitigate privacy risks, enforce data sovereignty, and comply with a growing number of data privacy and security regulations, such as, CCPA, PCI DSS and HIPAA.
Posted: 04 May 2021 | Published: 04 May 2021

TOPICS:  Data Security
Thales

The Key Pillars for Protecting Sensitive Data in Any Organization
sponsored by Thales
EBOOK: Take a brief survey to access an informative white paper on the 3 pillars of data-centric security and the CipherTrust Data Security platform by Thales.
Posted: 04 May 2021 | Published: 04 May 2021

TOPICS:  Data Security
Thales

eSentire MDR with Microsoft 365 Defender
sponsored by eSentire
RESOURCE: Access this resource to learn how combining eSentire Managed Detection and Response (MDR) with your existing investment in the Microsoft 365 ecosystem can help reduce your cybersecurity total cost of ownership, improve ROI and achieve better security outcomes.
Posted: 20 Apr 2021 | Published: 20 Apr 2021

TOPICS:  Data Security
eSentire

Making Sense of Sensitive Data
sponsored by PKWare
WHITE PAPER: In this white paper, read how PKWARE’s PK Protect offers data discovery and protection that locates and secures sensitive data to minimize organizational risks and costs, regardless of device or environment.
Posted: 20 Apr 2021 | Published: 20 Apr 2021

PKWare

WHERE IS ALL YOUR DATA AND WHO HAS ACCESS?
sponsored by SailPoint Technologies
RESEARCH CONTENT: This paper reviews a global research survey focusing on Identity and technology professionals to understand current trends around the management and governance of unstructured data. Download the report to uncover the results.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

TOPICS:  Data Security
SailPoint Technologies

SSO in the Cloud and Mobile Era
sponsored by Techtarget
RESOURCE: Single sign-on has always appeared to be the best option for log-in security, however, as use of the cloud increases and the BYOD trend continues to grow, additional protection is necessary to keep data protected. We're offering free access to one of our expert guides, SSO in the Cloud and Mobile Era.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

Techtarget

Royal Holloway: The Computer Misuse Act and the characteristics of convicted hackers
sponsored by ComputerWeekly.com
RESEARCH CONTENT: In this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act
Posted: 01 Apr 2021 | Published: 07 Apr 2021

ComputerWeekly.com

Compass®for Edge Computing
sponsored by Cobalt Iron
DATA SHEET: With Cobalt Iron Compass, you can eliminate the complexity and costs normally associated with edge computing backup processes. Download this datasheet to find out how and to discover the essential benefits of leveraging this solution for edge computing backup.
Posted: 23 Mar 2021 | Published: 23 Mar 2021

Cobalt Iron

COBALT IRON COMPASS®Data Protection for a Remote World
sponsored by Cobalt Iron
DATA SHEET: With Cobalt Iron Compass, customers can remotely manage, monitor, track, patch, and protect backup hardware and software—all from a single dashboard. Download the datasheet here to ensure your team can confidently keep your company’s data protection healthy, stable, and secure while working remote.
Posted: 22 Mar 2021 | Published: 22 Mar 2021

Cobalt Iron

End-to-end Data Protection for the Modern Data Center with Cobalt Iron Compass
sponsored by Cobalt Iron
ANALYST REPORT: Cobalt Iron introduced their Compass platform to drive down cost and fully manage, configure, and maintain data protection processes for you. Access this ESG paper for an in-depth, 3rd party look at Cobalt Iron Compass and the benefits of its fully managed, immutable data and ransomware protection.
Posted: 22 Mar 2021 | Published: 30 Jun 2020

Cobalt Iron

Magic Quadrant for Master Data Management Solutions
sponsored by TIBCO
WHITE PAPER: Access this Gartner Magic Quadrant for Master Data Management (MDM) Solutions to learn which MDM solutions offer features that make them top of the line, including workflow and business process management, data modeling abilities, data stewardship support, integration possibilities, and more.
Posted: 19 Mar 2021 | Published: 27 Jan 2021

TIBCO
1 - 25 of 1828 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences