IT Management  >   Systems Operations  >   Security  >  

Secure Data

RSS Feed   
Secure Data Reports
 
Data Encryption and Authentication for Cloud Storage
sponsored by ESET
EGUIDE: As organizations migrate to the cloud, they’re choosing cloud storage as a more efficient and cost-effective method to store their data. But with this transition comes security risks that cannot be ignored – cloud storage is more vulnerable. Dive into this e-guide to learn how encryption and authentication can help mitigate these risks.
Posted: 22 Mar 2021 | Published: 16 Mar 2021

ESET

Data quality emerges from Covid-19 more critical than ever
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

ComputerWeekly.com

Securing Microsoft Office 365 and Other Azure Applications with Ciphertrust Cloud Key Broker for Azure
sponsored by Arrow & Thales
WHITE PAPER: Today’s customers expect easy-to-use services, only paying for what they need. However, while they want more of these services, they either can’t or won’t give up control of their data for security reasons. Check out this white paper to see how the CipherTrust Cloud Key Broker for Azure aims to address this issue through key management.
Posted: 01 Mar 2021 | Published: 31 Aug 2020


AT THE EDGE OF CHANGE
sponsored by Aruba Networks
RESOURCE: As the volume of network data explodes it must be processed, stored and analyzed near its source – at the edge. What do IT decision makers (ITDMs) think of this change, and how are they preparing? What barriers to they need to overcome to utilize the edge? Jump into this infographic to find out.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

Aruba Networks

Threat Report: Maze Ransomware
sponsored by Cysiv
WHITE PAPER: Since 2019, the Maze threat actor group has been conducting ransomware campaigns where they both block access to data on victims’ machines and threaten to publish sensitive data for ransom – known as Maze ransomware. In this report, discover a comprehensive analysis of Maze ransomware, how it works and how to prevent it.
Posted: 20 Aug 2020 | Published: 07 Jul 2020

Cysiv

Compass®for Edge Computing
sponsored by Cobalt Iron
DATA SHEET: With Cobalt Iron Compass, you can eliminate the complexity and costs normally associated with edge computing backup processes. Download this datasheet to find out how and to discover the essential benefits of leveraging this solution for edge computing backup.
Posted: 23 Mar 2021 | Published: 23 Mar 2021

Cobalt Iron

How To Enhance A Data Loss Prevention Strategy Using Argon For Email
sponsored by Clearswift
EGUIDE: Organizations need to secure sensitive data and prevent cyberattacks, while maintaining communication with customers and suppliers. The following guide highlights why email security is a critical part of any data loss prevention (DLP) strategy and offers an inside look at the key features and capabilities of ARgon for Email.
Posted: 09 Feb 2021 | Published: 09 Feb 2021

Clearswift

CompTIA IT Security Community Data Breach Response Planning Guide
sponsored by CompTIA
RESOURCE: CompTIA's IT Security Community designed this resource to help you prepare a data breach response plan. The tips you'll find here range from the big picture (preplanning and testing) to the details (keeping related notes of an incident separate from day-to-day business), but are all designed to take fear of the unknown out of the equation.
Posted: 09 Nov 2020 | Published: 09 Nov 2020

CompTIA

Secure processing of personal data in the healthcare sector; making staff aware of the importance of privacy
sponsored by Zivver
EGUIDE: Data protection and compliance starts with streamlining internal processes, especially in the healthcare sector. This helpful e-guide provides a comprehensive set of the considerations and insights healthcare organizations (of any size) should make in order to create awareness for the secure processing of personal data – read on to get started.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Zivver

Ransomware State of Play
sponsored by Cylance
WEBCAST: Ransomware is evolving – campaigns are shifting from widespread to highly-targeted, often deployed via compromised MSSP. Additionally, Ransomware-as-a-Service (RaaS) is becoming more private, and threat actors are teaming up to extend their tooling. How can you stay secure? Watch this webcast to learn more about the state of play in ransomware.
Posted: 02 Nov 2020 | Premiered: Nov 2, 2020

Cylance
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences