Skip to content

Sensitive Data Stock Photos & Royalty-Free Images

All the stock photos you need and more from our global creative community.

Price is in US dollars and excludes tax and handling fees
System engineer fixing software applications issues

System engineer fixing software applications issues

$10
Young Muslim female webdesigner or programmer in beige headscarf

Young Muslim female webdesigner or programmer in beige headscarf

$5
Young Muslim businesswoman in hijab looking at computer screen while typing

Young Muslim businesswoman in hijab looking at computer screen while typing

$5
Close-up of young Muslim female programmer looking through coded data

Close-up of young Muslim female programmer looking through coded data

$5
Cybercriminal uploading USB containing stolen information into green screen PC

Cybercriminal uploading USB containing stolen information into green screen PC

$10
Cropped of Woman Holding Credit Card Typing on Laptop

Cropped of Woman Holding Credit Card Typing on Laptop

$6
Admin looking at isolated screen computer, managing cloud computing resources

Admin looking at isolated screen computer, managing cloud computing resources

$10
Levels of protection. Comparison of two protection systems.

Levels of protection. Comparison of two protection systems.

by iLixe48
$5
Close up of code running on computer displays in empty apartment used by hacker

Close up of code running on computer displays in empty apartment used by hacker

$10
Classified african american executive points finger over lips asking for silence

Classified african american executive points finger over lips asking for silence

$5
Cybercriminal uploading USB containing stolen information into green screen PC

Cybercriminal uploading USB containing stolen information into green screen PC

$10
Information on the display. Man is with metal detector in the field

Information on the display. Man is with metal detector in the field

$5
Close up of code running on computer displays in empty apartment used by hacker

Close up of code running on computer displays in empty apartment used by hacker

$10
Side view of young female programmer in headphones and hijab

Side view of young female programmer in headphones and hijab

$5
Cybercriminal hacking using green screen PC and getting critical error

Cybercriminal hacking using green screen PC and getting critical error

$10
Woman using tablet computer online shopping at home

Woman using tablet computer online shopping at home

$5
Young modern IT specialist in hijab and sweatshirt decoding information

Young modern IT specialist in hijab and sweatshirt decoding information

$5
Woman using tablet computer online shopping at home

Woman using tablet computer online shopping at home

$5
Admin and coworker conducting experiments and tests to optimize AI

Admin and coworker conducting experiments and tests to optimize AI

$10
Information on the display. Man is with metal detector in the field

Information on the display. Man is with metal detector in the field

$5
Lines of code running on PC in empty apartment, used by hacker to steal data

Lines of code running on PC in empty apartment, used by hacker to steal data

$10
IT professional working with AI tech to transform data into predictive models

IT professional working with AI tech to transform data into predictive models

$10
Admin assisted by coworker while working with machine learning

Admin assisted by coworker while working with machine learning

$10
All according to regulations. Studio shot of a sheet of shredded paper.

All according to regulations. Studio shot of a sheet of shredded paper.

$5
IT expert in office focused on transforming data into predictive models

IT expert in office focused on transforming data into predictive models

$10
IT staff member using laptop to do programming in office

IT staff member using laptop to do programming in office

$10
Young creative female webdesigner typing on computer keyboard

Young creative female webdesigner typing on computer keyboard

$5
Information on the display. Man is with metal detector in the field

Information on the display. Man is with metal detector in the field

$5
Hacker typing on keyboard, running neural network software to breach security

Hacker typing on keyboard, running neural network software to breach security

$10
Governmental hackers doing teamwork in protecting sensitive information

Governmental hackers doing teamwork in protecting sensitive information

$10