IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
1 - 25 of 1513 Matches Previous Page  |  Next Page
Compliant Digital Identity Protection for Healthcare
sponsored by VASCO Data Security International
WHITE PAPER: Discover how you can protect identities, safeguard patient records, and enable compliance with regulations - all without disrupting fast access to healthcare applications and patient information. Learn how to make threats less threatening and ensure smooth patient care throughout your organization.
Posted: 29 Sep 2016 | Published: 31 Dec 2015

VASCO Data Security International

The Rising Face of Cyber Crime Ransomware
sponsored by BitSight
WHITE PAPER: Learn how ransomware is evolving - and which industries are the most susceptible to attacks. Download the latest BitSight Insight report to find out how ransomware affects each industry, and what organizations can do to prevent it.
Posted: 28 Sep 2016 | Published: 31 Aug 2016

BitSight

Comparative Overview of File Sync and Share Platforms
sponsored by Hitachi Data Systems
WHITE PAPER: Discover a fully-integrated, on-premises platform for safe, secure file sharing and synchronization to allow employees to safely create and share content from mobile devices without compromising data security. Also, gain access to a comparative guide which looks at key categories of file sync and share tools.
Posted: 27 Sep 2016 | Published: 30 Jan 2015

Hitachi Data Systems

File Sync and Share: There’s Too Much at Stake to Compromise
sponsored by Hitachi Data Systems
WHITE PAPER: Learn about an enterprise file sync-and-share strategy that gives employees immediate access to files without bandwidth constraints or concerns over file size while giving IT a security control system over every file.
Posted: 27 Sep 2016 | Published: 30 Jan 2015

Hitachi Data Systems

Masters of Disaster Recovery: How Highly Resilient Organizations Excel
sponsored by IBM
WHITE PAPER: Why are some companies better at mastering disaster recovery in the face of today's "always-on" expectations? Download this report to discover just that, as evidenced by a survey of 310 BCDR professionals. In addition, learn how to formulate a battle-tested recovery plan based on the expert insights illustrated.
Posted: 27 Sep 2016 | Published: 27 Sep 2016

IBM

Securing & enabling the Mac-empowered enterprise
sponsored by Code42
WHITE PAPER: This white paper explains how you can create a comprehensive security program for your business. Learn to implement self-service restoration, total data visibility for your IT department, integrated management of PC's and Macs, and more.
Posted: 27 Sep 2016 | Published: 27 Sep 2016

Code42

2016 Cost of Data Breach Study: Impact of Business Continuity Management
sponsored by IBM
WHITE PAPER: The Ponemon Institute surveyed 383 companies in 16 industry sectors about their experience with data breaches. Learn how the majority of these companies are solving breaches efficiently and cost-effectively with business continuity management (BCM.)
Posted: 26 Sep 2016 | Published: 30 Jun 2016

IBM

Battling Malware, Intrusion, and Insider Threats with Endpoint Data Protection
sponsored by Code42
WHITE PAPER: With the growing popularity of third-party apps and BYOD initiatives, it's becoming increasingly difficult to secure your data from malware. Use this white paper to explore the potential ways in which endpoint data protection can help you build a security network focused around saving each piece of data for reliable access and retrieval.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

Code42

Two-Factor Authentication Protects Health Data
sponsored by VASCO Data Security International
WHITE PAPER: Discover how strong authentication and digital identity management can increase health data security while making it easier for providers to do their work. This paper also explores how patients can use this method to view and download health records from multiple portals while increasing privacy protection.
Posted: 26 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

Situational Awareness Monitoring Helps US Government Agency Meet Cybersecurity Requirements
sponsored by Gigamon
WHITE PAPER: This white paper describes how the HHS was able to meet their rigid security requirements in an era of rising malicious cybersecurity threats. Discover how they were able to achieve pervasive visibility of all network traffic across geographically dispersed locations and keep their massive amount of private information safe.
Posted: 26 Sep 2016 | Published: 31 Dec 2015

Gigamon

Safeguarding Vital Data Is a Battle You Can Win
sponsored by Intel Security
WHITE PAPER: In this resource, uncover what it means to develop data management and protection policies that reach from the core of the business out to mobile devices, the cloud and beyond. Also, learn how to be ready for whatever security challenges the world sends your way.
Posted: 24 Sep 2016 | Published: 24 Sep 2016

Intel Security

Harnessing the Power of Metadata for Security
sponsored by Gigamon
WHITE PAPER: Discover how metadata, rich in context, can help analyze security metrics faster to enable rapid threat remediation.
Posted: 23 Sep 2016 | Published: 31 Aug 2016

Gigamon

Better Together: Security and Collaboration with Backup and Box
sponsored by Code42
WHITE PAPER: This white paper examines a modern data mobility and security strategy that incorporates both a file sync and share app along with a comprehensive endpoint data backup platform. Access now to find out why just sync and share isn't enough to stand alone and mitigate the potentially permanent loss of critical data.
Posted: 23 Sep 2016 | Published: 23 Sep 2016

Code42

TAG Cyber Report: 2017 Security Annual – Vol. 1
sponsored by Digital Guardian
WHITE PAPER: This report provides CISO team members with detailed technical and architectural guidance based on fifty specific controls that support the reduction of cyber risk. It's a practical handbook and reference guide for the cyber security professional.
Posted: 22 Sep 2016 | Published: 31 Aug 2016

Digital Guardian

Companies, Digital Transformation and Information Privacy: The Next Steps
sponsored by Hewlett Packard Enterprise
WHITE PAPER: The following resource features in-depth interviews with legal, technical, and regulatory subject-matter experts on the digital data privacy debate. Explore challenges and strategies global businesses must face regarding this complex, fluctuating policy environment.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Hewlett Packard Enterprise

How to Secure Data Access Within the Healthcare Industry
sponsored by VASCO Data Security International
WHITE PAPER: Access this white paper to learn the changing role of technology within the health sector and why healthcare organizations continue to experience major data breaches. Discover best practices to help your organization integrate and adopt security without compromising the patient experience.
Posted: 22 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

Securing Office 365 Is Easier Than You Think
sponsored by Palo Alto Networks
WHITE PAPER: SaaS security concerns can no longer be ignored: Discover how to safely enable Office 365. Read on to address O365-specific security concerns, including details on how to secure O365 from malware insertion and data loss, gain visibility into SaaS usage, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

Avoid the Five Classic Fails of Enterprise Backup
sponsored by Code42
WHITE PAPER: Outdated backup technologies and patchwork add unnecessary burdens for IT and end users, increase costs, and leave the business vulnerable to disastrous data breach and data loss. This white paper highlights the five classic fails of enterprise backup, so you can avoid these common missteps.
Posted: 22 Sep 2016 | Published: 16 May 2016

Code42

Moving Beyond Masking and Subsetting: Realizing the Value of Test Data Management
sponsored by CA Technologies
WHITE PAPER: This paper describes common problems and potential benefits of Test Data Management (TDM) in a testing and development environment. Debunk assumptions that could be holding you back from better TDM, learn why masking production data is not a simple solution, and discover a more efficient and easier TDM policy for IT.
Posted: 22 Sep 2016 | Published: 31 Jul 2016

CA Technologies

Questions to Ask Your Cloud Service Provider: Know how your Data will be Protected in the Cloud
sponsored by Intel Security
WHITE PAPER: As you evaluate potential CSPs, keep these security, privacy, and operational questions in mind. Explore ways to determine who has access to your data, how your data is kept private, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Intel Security

Technology Solutions to the GDPR Challenge
sponsored by Close Brothers Technology Services
WHITE PAPER: This paper examines some of the problems caused by The General Data Protection Regulation and how it can be used as a catalyst for improvements in security. Find out how you'll be able to turn compliance with this new legislation into an opportunity for to improve data portability, retention, classification and more.
Posted: 21 Sep 2016 | Published: 30 Jun 2016

Close Brothers Technology Services

IoT: Internet of Things or Internet of Threats?
sponsored by Radware
WHITE PAPER: This research report aims to convey the challenges, threats, and opportunities that C-level security executives face when it comes to information security. Learn why the IoT is one of today's top concerns, and what organizations can do to ensure security.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Radware

Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

Buyer’s Checklist: mHealth Development Platforms
sponsored by CloudMine
WHITE PAPER: Building digital healthcare solutions requires a curated tool set and strict attention to the policies that govern patient information. Otherwise, that data could be at risk of unauthorized access. This buyer's checklist highlights the key mHealth development platform capabilities you require to build secure and compliant mHealth applications.
Posted: 20 Sep 2016 | Published: 06 Jul 2016


Reeling in Ransomware Data Protection for You and Your Users
sponsored by Code42
WHITE PAPER: In this white paper, learn how you can protect your devices and negate the effects of ransomware. Explore how continuous endpoint backup enables IT to quickly and easily restore files to minutes before the infection, as well as ensures that those files are healthy with no end-user intervention required.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

Code42
1 - 25 of 1513 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement