Skip to content

Sensitive Data Stock Photos & Royalty-Free Images

All the stock photos you need and more from our global creative community.

Price is in US dollars and excludes tax and handling fees
Confidentiality intact. Studio shot of a sheet of shredded paper.

Confidentiality intact. Studio shot of a sheet of shredded paper.

$5
Young Muslim intern in hijab decoding data on computer screens by workplace

Young Muslim intern in hijab decoding data on computer screens by workplace

$5
Woman using tablet computer online shopping at home

Woman using tablet computer online shopping at home

$5
Hacker in hood breaking into database

Hacker in hood breaking into database

$10
Screen with hackers recording threat

Screen with hackers recording threat

$10
Hacker breaching system security

Hacker breaching system security

$10
Employee conducting code review to fix bugs in machine learning company software.

Employee conducting code review to fix bugs in machine learning company software.

$10
Running code breaking into server

Running code breaking into server

$10
Hands protecting a hidden password speech bubble symbolizing online security

Hands protecting a hidden password speech bubble symbolizing online security

$5
Young Muslim female programmer pointing at data on computer screen

Young Muslim female programmer pointing at data on computer screen

$5
Internet thief recording ransom video

Internet thief recording ransom video

$10
Close up shot of dangerous hacking code running on computer system monitors

Close up shot of dangerous hacking code running on computer system monitors

$10
Joyous hacker feeling proud after breaching defenses using rogue scripts

Joyous hacker feeling proud after breaching defenses using rogue scripts

$10
Military IT experts working on cyber security in a high tech government office

Military IT experts working on cyber security in a high tech government office

$10
Cybercriminal hacking using green screen PC and getting critical error

Cybercriminal hacking using green screen PC and getting critical error

$10
Lines of code displayed on computer monitors

Lines of code displayed on computer monitors

$10
Rogue programmer successfully gaining access to victim data

Rogue programmer successfully gaining access to victim data

$10
Woman optimizing company software for improved performance and scalability

Woman optimizing company software for improved performance and scalability

$10
Rogue programmer successfully gaining access to victim data

Rogue programmer successfully gaining access to victim data

$10
Extreme close up shot of lines of code displayed on computer monitors

Extreme close up shot of lines of code displayed on computer monitors

$10
Government army hackers engaged in hybrid warfare strategies in agency office

Government army hackers engaged in hybrid warfare strategies in agency office

$10
Military IT experts working on cyber security in a high tech government office

Military IT experts working on cyber security in a high tech government office

$10
IT specialist training predictive models using green screen computer

IT specialist training predictive models using green screen computer

$10
Programmer typing on keyboard, developing machine learning APIs, close up

Programmer typing on keyboard, developing machine learning APIs, close up

$10
Programmer using mockup PC to develop machine learning APIs

Programmer using mockup PC to develop machine learning APIs

$10
Programmer checking results on tablet after creating machine learning models

Programmer checking results on tablet after creating machine learning models

$10
Programmer developing artificial intelligence machine learning APIs

Programmer developing artificial intelligence machine learning APIs

$10
Technician testing AI company software, identifying bottlenecks

Technician testing AI company software, identifying bottlenecks

$10