IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Multimedia (View All Report Types)
1 - 25 of 233 Matches Previous Page  |  Next Page
GDPR & Data Protection Webcast
sponsored by Oracle
VIDEO: Take an in-depth look at this data protection and GDPR webcast to learn more about the regulation and uncover relevant compliance strategies. In addition, hear from a business consultant from the Dutch Ministry of Economic Affairs regarding their experience implementing a data protection strategy.
Posted: 07 Dec 2017 | Premiered: 01 Dec 2017

Oracle

GDPR Security Strategies
sponsored by Oracle
VIDEO: The GDPR is coming quickly and requires heightened security and compliance with data protection regulations. Take an in-depth look at this webcast to uncover security strategies for GDPR compliance preparation.
Posted: 06 Dec 2017 | Premiered: 01 Dec 2017

Oracle

CASB Podcast
sponsored by Oracle
PODCAST: This brief podcast reveals the importance of Cloud Access Security Brokers (CASB) and how they can advance your security posture, without having an effect on the end users.
Posted: 05 Dec 2017 | Premiered: Dec 5, 2017

Oracle

How to Get More Personal Data Without the Risk
sponsored by Evident
WEBCAST: According to Continuum, 3.7 million personal data records are stolen every day. Take an in-depth look at this webinar to gain insight into the worsening security problem facing enterprises today, the concern about safety of personal data, and tips for choosing a verification partner.
Posted: 01 Dec 2017 | Premiered: Dec 1, 2017

Evident

How to Avoid Being the Victim of a Data Breach
sponsored by Evident
WEBCAST: There are 3.8 million data records stolen every day, according to Continuum. No businesses are safe, so how can you stay ahead of hackers? This webcast offers insight into what is driving the growth of security breaches, the top causes of data breaches such as malware and phishing, and 3 steps to take when protecting personal data.
Posted: 30 Nov 2017 | Premiered: Nov 30, 2017

Evident

FBI Cyber Squad Guest Speaking on Emerging Cyber Threats
sponsored by Digital Shadows
WEBCAST: Do you understand your data and susceptibility to being targeted? Watch this webcast to uncover emerging cyber threats, persistent vulnerabilities and strategies for protecting your enterprise.
Posted: 21 Nov 2017 | Premiered: Nov 21, 2017

Digital Shadows

Introducing the Delphix Dynamic Data Platform
sponsored by Delphix
VIDEO: IDC predicts that by 2025, worldwide data will grow to 163 ZB – majority being created and managed by enterprises. What does this mean for you now? This webcast discusses the need to rethink current data management approaches and access to data, which will require significant changes among people and processes.
Posted: 21 Nov 2017 | Premiered: 15 Nov 2017

Delphix

EU General Data Protection Regulation
sponsored by MarkLogic
VIDEO: This webcast covers the importance of understanding the GDPR, and steps you can take to comply with the new regulation, with the use of a database that integrates data better and faster, and that's cost efficient.
Posted: 21 Nov 2017 | Premiered: 15 Nov 2017

MarkLogic

Go From Compromise to Containment - Fast
sponsored by Rapid 7
WEBCAST: According to the Verizon Data Breach Investigations Report, stolen credentials are the number one threat vector across all data breaches. Watch this webcast to uncover how you can detect the top attack vectors behind breaches, including compromised credentials, malware, and phishing.
Posted: 20 Nov 2017 | Premiered: Nov 20, 2017

Rapid 7

Step Up Your Security and Privacy with Data Masking
sponsored by Delphix
VIDEO: With data breaches occurring regularly, organizations are forced to better protect sensitive data across the enterprise. However, doing so and staying compliant is not an easy task, especially with new mandates like GDPR and HIPAA. This webcast explores how you can use data masking to keep data protected.
Posted: 20 Nov 2017 | Premiered: 15 Nov 2017

Delphix

Managed Detection and Response Service
sponsored by Rapid 7
WEBCAST: According to the 2017 SANS Incident Response Survey, 87% responded to at least one incident in the past year. Take a look at this webcast to gain insight into improving your incident response strategy by validating and identifying known and unknown threats in order to protect your company.
Posted: 20 Nov 2017 | Premiered: Nov 7, 2017

Rapid 7

Comprehensive Threat Prevention Security for AWS
sponsored by AWS - Check Point
WEBCAST: The average cost of a data breach is $6.53 million. How can you reduce your likelihood of falling victim to costly data breaches? Explore this in-depth webcast to learn about how AWS can help improve your network security by allowing you to define your cloud controls.
Posted: 20 Nov 2017 | Premiered: Nov 20, 2017

AWS - Check Point

This is My Architecture – Check Point Software Technologies, Scaling Security
sponsored by AWS - Check Point
WEBCAST: Explore this brief webcast to learn about how Check Point Software's security technology architecture works in the AWS cloud.
Posted: 20 Nov 2017 | Premiered: Nov 20, 2017

AWS - Check Point

3-Fold Approach and Best Practices to Cyber Security
sponsored by Citrix
WEBCAST: 71 percent of organizations say that there is risk from their inability to control employees' devices and apps. Download this webcast to discover a 3 fold approach to security that secures data and apps across any device, network and cloud.
Posted: 15 Nov 2017 | Premiered: Nov 15, 2017

Citrix

Security Automation and Orchestration Best Practices
sponsored by ServiceNow
WEBCAST: According to a recent Forrester Research Survey, 68% of respondents state that using automation and orchestration tools to improve security operations is a high or critical priority. Watch this webcast to gain insight into security automation and orchestration (SAO) best practices and a roadmap for deployment.
Posted: 13 Nov 2017 | Premiered: Nov 13, 2017

ServiceNow

What is Multi-factor Authentication?
sponsored by HID Global
VIDEO: Users and passwords can be your weakest link. Watch this brief overview of multi-factor authentication to protect your company.
Posted: 19 Oct 2017 | Premiered: 19 Oct 2017

HID Global

How Splunk Enables Fast Data Science for Cybersecurity Operations
sponsored by Splunk
WEBCAST: Discover how to bridge the gap between data scientists and security analysts to accelerate intelligence for cybersecurity operations. Plus, find out how Splunk's machine learning-enabled analytics provides a unified system for collecting, digesting, and querying data.
Posted: 12 Oct 2017 | Premiered: Sep 30, 2017

Splunk

Protecting Data After the Digital Disruption
sponsored by Proofpoint, Inc.
WEBCAST: Data is no longer stored in one location and companies are running into challenges related to securing sensitive data. Watch this webcast to uncover key challenges driving DLP as well as stages of DLP maturity, considerations for your DLP strategy, and more.
Posted: 04 Oct 2017 | Premiered: Oct 4, 2017

Proofpoint, Inc.

Cloud Data Management: Enabling Hybrid IT Infrastructure
sponsored by Commvault
VIDEO: Moving to the cloud has its advantages, but you cannot rush the process when it comes to securely moving and managing your data. Take 1 minute to learn how intelligent hybrid IT can move your data efficiently, securely, and enable access to data when you need it.
Posted: 02 Oct 2017 | Premiered: 26 May 2017

Commvault

As a DevOps Engineer, What Should I know about Security Tools?
sponsored by CyberArk Software, Inc
VIDEO: Watch this webcast to uncover what you should know about security tools and protection in order to properly secure your DevOps.
Posted: 20 Sep 2017 | Premiered: 20 Sep 2017

CyberArk Software, Inc

IT Security and the Devops Environment
sponsored by CyberArk Software, Inc
VIDEO: DevOps environments are unique because of the speed and scale at which they work. Watch this webcast to reveal characteristics regarding DevOps environments as well as the security aspects of DevOps.
Posted: 19 Sep 2017 | Premiered: 19 Sep 2017

CyberArk Software, Inc

Get Your Company GDPR-Ready: Research Study Results
sponsored by CA Technologies.
WEBCAST: The General Data Protection Regulation (GDPR) is bringing new rules and penalties for the misuse or loss of personal data. Explore the results of this Vanson Bourne research study to learn about the impacts of the GDPR, steps you can take to ready your company, enterprises' plans to purchase tools and adopt new data strategies, and more.
Posted: 12 Sep 2017 | Premiered: Sep 6, 2017, 01:01 EDT (05:01 GMT)

CA Technologies.

Ready, Set, Go: General Data Protection Regulation (GDPR)
sponsored by CA Technologies.
WEBCAST: With the General Data Protection Regulation (GDPR) looming in the very near future, it's extremely important to know what it is, how you can comply, and how it may affect you. In this webinar, explore recommendations by CA Technologies that can help you prepare for the GDPR's arrival.
Posted: 11 Sep 2017 | Premiered: Sep 6, 2017

CA Technologies.

New Zealand Transport Agency Customer Success Story
sponsored by OpenText
VIDEO: Watch this brief video case study to find out how the NZ Transport Agency used enterprise content management as a service (ECMaaS) to improve the way they store, share, protect, and manage digital information.
Posted: 13 Oct 2017 | Premiered: 13 Oct 2017

OpenText

Hydro Tasmania Customer Success Story
sponsored by OpenText
VIDEO: Watch this brief video case study to find out how Hydro Tasmania unified scattered information and resolved content inefficiencies in their SAP, ERP, and SharePoint environments.
Posted: 13 Oct 2017 | Premiered: 13 Oct 2017

OpenText
1 - 25 of 233 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement