IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Multimedia (View All Report Types)
26 - 50 of 230 Matches Previous Page  |  Next Page
Why Scan to E-Mail Has Made Your Printers a Threat
sponsored by Nuance
VIDEO: This brief video explains why scanning and accidentally e-mailing documents to the wrong place can make your printer one of your company's greatest liabilities.
Posted: 24 Jun 2015 | Premiered: 03 Apr 2015

Nuance

Gain Control of Sensitive Documents
sponsored by Nuance
VIDEO: Take a look at this brief video to discover just how dangerous an insecure printer can be, and to learn what you can do to protect your sensitive documents.
Posted: 22 Jun 2015 | Premiered: 03 Apr 2015

Nuance

Navigating 5 Common Challenges to PCI 3.0 Compliance
sponsored by FireHost Inc.
WEBCAST: This webcast explores 5 common challenges to PCI DSS 3.0 compliance.
Posted: 22 Jun 2015 | Premiered: Jun 22, 2015

FireHost Inc.

10 Ways to Protect Your Company From a Data Breach
sponsored by Bit9 + Carbon Black
WEBCAST: This webcast presents a 10 step strategy to tightening retail security and maintaining PCI compliance.
Posted: 19 Jun 2015 | Premiered: Apr 4, 2014

Bit9 + Carbon Black

Enhancing Authentication to Go Beyond Username and Password Vulnerabilities
sponsored by HID
VIDEO: This brief video explores remote access security challenges and how to go beyond simple username/password combinations to enhance your authentication security strategy.
Posted: 15 Jun 2015 | Premiered: 05 Jun 2013

HID

Customer Spotlight: Deploying a Data Protection Program In Less Than 120 Days
sponsored by Digital Guardian
WEBCAST: In this webcast, Mike Ring from Jabil discusses his company's experience deploying a data protection program from Digital Guardian in 120 days.
Posted: 09 Jun 2015 | Premiered: Nov 5, 2014

Digital Guardian

PDF Protection: Features and Benefits
sponsored by Nuance
VIDEO: PDF files often contain sensitive information about people, organizations, and products that need to be protected before sharing. This brief video explores capabilities that ensure safe PDF sharing. Discover what you may be missing for compliant collaboration.
Posted: 22 May 2015 | Premiered: 02 Apr 2014

Nuance

Why InfoSec Needs Guarantees
sponsored by WhiteHat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 22 May 2015 | Premiered: May 12, 2015

WhiteHat Security

Maximizing the Efficiency of a Loan's Lifecycle
sponsored by Nuance
VIDEO: Manual, paper-based loan processes expose banks to longer delays, errors, and customer attrition. This featured video lays out concerns and strategies to leverage financial institutions' most critical process. Discover the benefits of expediting loans with collaborative technologies.
Posted: 13 May 2015 | Premiered: 23 Mar 2015

Nuance

Avoiding the Headlines: 5 Critical Security Practices to Implement Now
sponsored by CloudPassage
VIDEO: Inside this webinar, join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage to learn five best practices to put in place in order to avoid a security breach within your organization.
Posted: 24 Apr 2015 | Premiered: 24 Apr 2015

CloudPassage

The State of Cloud Security: 2015 Survey Results
sponsored by CloudPassage
VIDEO: Join Holger Schulze, Founder of the Information Security Community on LinkedIn, Amrit Williams, CTO of CloudPassage, and Mitch Bishop, CMO for CloudPassage on this informative web seminar to learn what the current state of cloud security looks like.
Posted: 23 Apr 2015 | Premiered: 31 Mar 2015

CloudPassage

Case Study: Local Government Finds the Perfect Security Intelligence Solution
sponsored by IBM
VIDEO: In this video, discover how a local government found a security intelligence tool that met their needs.
Posted: 22 Apr 2015 | Premiered: 14 Jan 2015

IBM

Using Backup Software For Secure, Offsite Data Protection
sponsored by Asigra
WEBCAST: Access this Q&A video to hear from Craig Cook, Director of OnDemand Services at Long View Systems, about why he chose Asigra for a secure backup solution that allowed the consulting and managed services provider to go to market with a cloud backup offering.
Posted: 07 Apr 2015 | Premiered: Aug 31, 2014

Asigra

Security Analytics:Anomaly Detection for IT Security
sponsored by Prelert
VIDEO: Watch this video to learn how anomaly detection systems use advanced analytics to uncover even the subtlest cybercriminals.
Posted: 25 Mar 2015 | Premiered: 25 Mar 2015

Prelert

More Accurate Security Anomaly Detection
sponsored by Prelert
WEBCAST: This webcast explores how machine learning can move around false positives and find the real threats.
Posted: 25 Mar 2015 | Premiered: Mar 25, 2015

Prelert

Get a Closer Look at Security Alerts
sponsored by Prelert
WEBCAST: Watch this webinar to discover how anomaly detection can update your IT for today's security environment.
Posted: 24 Mar 2015 | Premiered: Mar 24, 2015

Prelert

Uncover the Abnormal with Anomaly Detection
sponsored by Prelert
WEBCAST: This webcast shows you how to uncover abnormal network behavior with the help of security analytics and anomaly detection.
Posted: 24 Mar 2015 | Premiered: Mar 24, 2015

Prelert

Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

CrashPlan Free Trial Offer
sponsored by Code42
SOFTWARE DEMO: It's time to try a better approach to backing up and protecting your valuable data. Download this trial of CrashPlan to experience an easy and secure way to backup, manage, restore, and share your files. Read on now to learn how this allows you to deliver free local backup, free offsite backup, unlimited online backup, and more
Posted: 18 Nov 2014 | Premiered: 18 Nov 2014

Code42

Taking Authentication Beyond Passwords for Secure Always-On Mobile Access
sponsored by HID
VIDEO: This short video depicts how mobile workers can gain secure remote access to the company VPN with mobile and tokenless authentication from HID.
Posted: 22 Oct 2014 | Premiered: 22 Oct 2014

HID

Meet N-able Security Manager
sponsored by Solarwinds N-able
VIDEO: Access this brief video to learn about an industry-awarded and industry-leading anti-virus solution that meets the need of your business while still allowing you to remain profitable.
Posted: 23 Sep 2014 | Premiered: 25 Feb 2014

Solarwinds N-able

Meet the N-able product family
sponsored by Solarwinds N-able
VIDEO: This video to gives you a brief overview of the N-central platform and capabilities. You'll also learn about the powerful modules that make this the leading RMM and MSP automation solution.
Posted: 23 Sep 2014 | Premiered: 08 Apr 2014

Solarwinds N-able

Simplify Your HIT Needs
sponsored by Commvault
VIDEO: Learn about a leading data management solution that will enable you to protect, access and manage healthcare data simply.
Posted: 10 Sep 2014 | Premiered: 19 Dec 2013

Commvault

Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Limited

Roundtable Q&A with Forrester Research, Inc. and IBM
sponsored by IBM
VIDEO: Access this informative round table discussion to hear from security experts from Forrester and IBM about the top challenges and trends in data security. Learn how you can step up your security game to ensure your data is protected.
Posted: 12 Mar 2015 | Premiered: 12 Mar 2015

IBM
26 - 50 of 230 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement