IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Multimedia (View All Report Types)
1 - 25 of 226 Matches Previous Page  |  Next Page
Classify and Secure All of Your Sensitive Data
sponsored by Identity Finder, LLC
VIDEO: This brief video describes how you can find and protect all of your sensitive data for the utmost security and compliance.
Posted: 12 Oct 2015 | Premiered: 27 Dec 2013

Identity Finder, LLC

Best Practices On-Demand Webinar:  Classification Techniques for Data Protection
sponsored by Identity Finder, LLC
WEBCAST: In this webinar, Forrester senior analyst Heidi Shey reveals how to turn your data classification project into a success. Tune in and learn how to protect sensitive data types beyond the realm of what is considered regulated.
Posted: 12 Oct 2015 | Premiered: Jun 24, 2015

Identity Finder, LLC

Use Case On-Demand Webinar:  How West Virginia University Reduced Its Sensitive Data Footprint
sponsored by Identity Finder, LLC
WEBCAST: In the following webinar, chief information security officer Alex Jalso discusses best practices for reducing your sensitive data footprint. Tune in to learn how to identify a sensitive data footprint within your security environment.
Posted: 12 Oct 2015 | Premiered: Oct 12, 2015

Identity Finder, LLC

PST Migration Requirements
sponsored by QUADROtech
VIDEO: This video outlines PST migration requirements. Tune in to learn about the importance of transparency, speed, and more so that you can have the smoothest migration process possible.
Posted: 07 Oct 2015 | Premiered: 07 Oct 2015


Eliminating PSTs with PST FlightDeck
sponsored by QUADROtech
VIDEO: This brief video details an email archive platform that simplifies PST migration. Tune in to learn how you can reduce costs and downtime during migration.
Posted: 07 Oct 2015 | Premiered: 07 Oct 2015


ArchiveShuttle Product Video
sponsored by QUADROtech
VIDEO: This video outlines how to easily migrate email and protect sensitive data through archiving. Tune in to learn about how to reduce the cost, complexity, and risk of email archiving at every stage of the process.
Posted: 06 Oct 2015 | Premiered: 06 Oct 2015


Secure, Efficient File-Sharing
sponsored by FinalCode
VIDEO: This brief video looks at a security system that keeps files safe without changing the way employees share them.
Posted: 05 Oct 2015 | Premiered: 29 May 2015


An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 01 Oct 2015 | Premiered: Jul 1, 2015

WhiteHat Security

Why InfoSec Needs Guarantees
sponsored by WhiteHat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 01 Oct 2015 | Premiered: May 12, 2015

WhiteHat Security

An Innovative Approach to Encrypted Network Security
sponsored by Unisys
VIDEO: This video introduces a new kind of encryption that keeps data on your network and mobile devices more secure while allowing for simple endpoint management and access.
Posted: 30 Sep 2015 | Premiered: 11 Sep 2015


How to Keep Your Public Cloud Private
sponsored by HyTrust
PODCAST: This podcast discusses how you can ensure data protection, security, and compliance in the public cloud. Listen in to learn how you can begin enjoying the benefits of the public cloud without fear.
Posted: 29 Sep 2015 | Premiered: Sep 22, 2015


Operation Clandestine Wolf: A Successful Zero-Day Attack Examined
sponsored by FireEye
WEBCAST: This webcast explores the anatomy of the attack and how APT3 achieved success.
Posted: 25 Sep 2015 | Premiered: Jun 24, 2015


File Sharing Insecurity: The Final Data Leakage Frontier
sponsored by FinalCode
WEBCAST: In this webinar, discover how you can strengthen security for you shared files without staunching innovation and collaboration.
Posted: 21 Sep 2015 | Premiered: Oct 8, 2015


Leveraging IT Trends: The Benefits and Challenges of Cloud Outsourcing
sponsored by Dell, Inc.
WEBCAST: In this webcast, Guy Currier, Director of Global Cloud Solutions Marketing at Dell, addresses how to leverage the new IT trends concerning cloud sourcing, and the benefits and challenges contained therein. View now to see why companies are placing a high stake in service-centric automation.
Posted: 21 Sep 2015 | Premiered: Sep 21, 2015

Dell, Inc.

Smart Data Lakes - Game Changing, Graph-Based Data Discovery, Analytics and Governance for the Enterprise
sponsored by Cambridge Semantics
WEBCAST: This informative webinar will explain how to turn data assets into extreme insight. Register now and learn how you can create a competitive advantage for your enterprise with efficient data analytics.
Posted: 15 Sep 2015 | Premiered: Sep 24, 2015

Cambridge Semantics

Optimizing VMware Investments with Native Data Protection and EMC Data Domain
sponsored by EMC
WEBCAST: This webcast outlines how VMware backup and recovery can effectively protect data, as well as help provide a strong ROI on your virtual environment.
Posted: 14 Sep 2015 | Premiered: Feb 28, 2014


A New Way to Think about Security
sponsored by IBM
VIDEO: This brief video describes why managed security services (MSS) may be the answer to the increasingly complex question of modern security.
Posted: 14 Sep 2015 | Premiered: 07 Apr 2015


Shadow Data Exposed: 7 High Profile Risks
sponsored by Elastica
WEBCAST: In this webcast, you'll uncover the 7 high level risks of Shadow Data exisiting in your enterprise and how to gain control over Shadow IT. View now to learn how to gain more visibility into SaaS applications to prevent data loss or breaches.
Posted: 10 Sep 2015 | Premiered: Sep 2, 2015


Maintaining Compliance vs. Cloud Shadow Data
sponsored by Elastica
WEBCAST: In this webcast, you'll learn the data compliance risks that exist in the cloud and cloud-based apps.
Posted: 09 Sep 2015 | Premiered: Sep 2, 2015


Cloud Security: Revealing Shadow Data
sponsored by Elastica
WEBCAST: This webcast presents how Shadow Data creates countless vulnerabilities in your cloud security strategy.
Posted: 08 Sep 2015 | Premiered: Aug 19, 2015


Protecting Your Data in Office 365
sponsored by Elastica
WEBCAST: This webcast examines Shadow Data and the security vulnerabilities it opens for IT
Posted: 08 Sep 2015 | Premiered: Aug 12, 2015


Is Your High-Value Data Safe?
sponsored by Imation Corp.
WEBCAST: This webcast discusses how you can build security architecture that safeguards your data at every stage of the data lifecycle.
Posted: 04 Sep 2015 | Premiered: Aug 27, 2015

Imation Corp.

Using Big Data for Data Security
sponsored by Splunk
WEBCAST: This webcast demonstrates how to accurately determine the threat activity your organization faces.
Posted: 02 Sep 2015 | Premiered: Jan 16, 2014


How Do Enterprise Data Protection Platform Vendors Stack Up?
sponsored by IBM
WEBCAST: In this webcast, Vinny Choinski, Senior Lab Analyst at Enterprise Strategy Group, examines a software solution designed to protect VMware environments by transferring block-level incremental data from snapshots between virtual environments and the TSM server.
Posted: 01 Sep 2015 | Premiered: Sep 8, 2014


Updated Machine Data Platform Offers Improved Performance
sponsored by Splunk
WEBCAST: This webcast explores a machine data platform that allows organizations to search, navigate, and interact with data that is generated in real time. Watch now to learn more about how all of your data can not only become available and useful, but also how it can be protected with this data platform.
Posted: 31 Aug 2015 | Premiered: Aug 31, 2015

1 - 25 of 226 Matches Previous Page    1 2 3 4    Next Page
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement