IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
1 - 25 of 1264 Matches Previous Page  |  Next Page
Cybersecurity Roadmap
sponsored by Cisco Systems, Inc.
WHITE PAPER: Every industry can be targeted by cybercrimes one way or another. Read this white paper to uncover strategies to protect your business from cyberattacks and see how this relates to your specific industry.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Cisco Systems, Inc.

Discover a Database and Big Data Scanner
sponsored by Trustwave
WHITE PAPER: This white paper explores the capabilities of a database scanner that allows you to immediately discover, assess, and report on the security, risk, or compliance posture of any database or big data store within your environment (on premise or in the cloud) in minutes.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Trustwave

Are You Sure You Didn't Authorize Someone You Shouldn't Have?
sponsored by HID
WHITE PAPER: Explore lessons learned from the Google Docs phishing scam. Learn the role multi-factor authentication plays in protecting organizations from phishing attacks and other cyber threats.
Posted: 14 Aug 2017 | Published: 15 Jun 2017

HID

How 3 Companies Leverage Machine Data to Improve Security, Solve Business & IT Challenges
sponsored by Splunk
WHITE PAPER: One of the most important – and often, most overlooked – resources that an organization can tap into to protect from cyberattacks is machine data. Learn how 3 companies are leveraging machine data to protect themselves against the latest cyberthreats and to address IT operations, IoT and business analytics challenges as well.
Posted: 14 Aug 2017 | Published: 14 Aug 2017

Splunk

Don't Overlook Email When Planning for GDPR Compliance
sponsored by Mimecast
WHITE PAPER: With the GDPR deadline less than a year away, businesses need to focus on their most critical applications, email. Uncover best practices and how to mitigate GDPR risk for email.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Mimecast

Cloud Security: 2017 Spotlight Report
sponsored by Quest
WHITE PAPER: Access this e-book to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Quest

Achieving Security Through Data-Driven Intelligence: Splunk for Defense Overview
sponsored by Splunk
WHITE PAPER: In this product guide, learn how Splunk can be used for security purposes, allowing you to achieve security and efficiencies through data-driven intelligence.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Splunk

5 Tips to Slay the Cloud Disaster Recovery Dragon
sponsored by Commvault
WHITE PAPER: As more companies look to the cloud to handle the onslaught of data, current cloud-based data recovery strategies are leaving a lot to be desired. Cloud-based DR may look like a monstrous dragon to some, but this white paper offers five control tips to a more fully enveloped cloud DR strategy. Read on here. .
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Commvault

Getting GDPR Compliant With Your Big Data Analytics
sponsored by Datameer
WHITE PAPER: Explore how to become GDPR compliant with your big data analytics. Discover 5 critical capabilities to secure and govern your data so your organization is GDPR-ready.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Datameer

Overcome Security Barriers to the Cloud
sponsored by Commvault
WHITE PAPER: Learn how to enable data security features in the cloud to avoid costly data breaches. As a bonus, discover 4 other barriers to the cloud and how to overcome these challenges.
Posted: 09 Aug 2017 | Published: 31 Dec 2015

Commvault

Achieve Governed Self-Service Analytics at Scale
sponsored by Tableau Software
WHITE PAPER: Uncover 4 steps for successfully deploying governed self-service analytics so that you can meet the growing need for self-service analytics while still ensuring a high standard of data governance, trust, security, and monitoring.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Tableau Software

The Need for Rapid Security Investigation
sponsored by Splunk
WHITE PAPER: Often when an issue or unsuspected attack occurs, IT teams find out too late. Explore an analytics-driven approach to security that enables organizations to respond to incidents as soon as possible.
Posted: 08 Aug 2017 | Published: 08 Aug 2017

Splunk

Data Governance for Self-Service Analytics
sponsored by Tableau Software
WHITE PAPER: Learn how to create a data governance strategy for self-service analytics by uncovering the 4 essential elements of a refined data governance strategy. Plus, discover how to create mobile and cloud support for you data management and security initiatives.
Posted: 08 Aug 2017 | Published: 08 Aug 2017

Tableau Software

How EMM Can Help With GDPR Compliance
sponsored by MobileIron
WHITE PAPER: Explore how a comprehensive EMM program can be an important part of your GDPR compliance initiative. Uncover an overview of GDPR principles, 7 tips to deploy EMM for GDPR compliance, and more.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

MobileIron

The Security Benefits of Prioritizing Critical Data Assets
sponsored by InteliSecure
WHITE PAPER: Do you know what your critical data assets are? This 6-part white paper explores how to define your critical data assets so you can save time and money, all while improving your security posture.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

InteliSecure

Meeting Top Data Protection Challenges
sponsored by Avnet
WHITE PAPER: This white paper explores a strategy that can help you meet top data protection challenges, including cloud security, GDPR requirements, and ransomware attacks.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

Avnet

Streamline Authentication with Voice Biometrics to Improve Contact Center Customer Experiences
sponsored by NICE Systems, Inc
WHITE PAPER: Discover how voice biometrics (VB) streamlines your entire customer authentication system, improves contact center efficiency, enhances security for sensitive customer data, and creates better overall customer experiences.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

NICE Systems, Inc

How to Create a Cybersecurity Policy for Your Organization
sponsored by HelpSystems
WHITE PAPER: Discover a 4-step plan to build a cybersecurity policy for your organization. As a bonus, uncover additional resources to create a data breach response plan.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

HelpSystems

Achieve GDPR Readiness with Secure App and Data Delivery
sponsored by Citrix
WHITE PAPER: A Ponemon Institute study finds that most organizations do not feel prepared for the requirements of the GDPR. Discover how you can meet GDPR compliance through application security, contextual access, and more.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

Citrix

The Race to Meet GDPR Compliance
sponsored by HyTrust
WHITE PAPER: No matter where you are in the world, if you do business within the EU, you need to be prepared for GDPR compliance. This white paper provides an overview of the GDPR so you can get ready.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

HyTrust

How UEBA Reduces the Threat of Insider Data Leakage
sponsored by Veriato, Inc.
WHITE PAPER: Insider access means an employee can learn where sensitive data resides, the value of that data, and the best times to initiate an attack. This white paper examines how you can stop insider data leaks.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

Veriato, Inc.

Effective Incident Response Through User Activity Monitoring
sponsored by Veriato, Inc.
WHITE PAPER: The longer a cyber incident remains undiscovered, the more likely it will be that the organization will realize a significant data breach. Explore how to achieve effective incident response through user activity monitoring.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

Veriato, Inc.

GDPR is Coming
sponsored by HyTrust
WHITE PAPER: The EU General Data Protection Regulation (GDPR) will come into effect on May 25th 2018 – significantly changing the rules for how organizations protect the private data of EU citizens. Gain a deeper understanding of the GDPR regulation and insight into solutions that will help organizations meet its stringent compliance requirements.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

HyTrust

Securing Industrial IoT Technology: 4 Key Considerations
sponsored by Bayshore Networks
WHITE PAPER: Learn how to stop cyberthreats before they can damage critical industrial assets and systems by going inside one cyberattack launched against energy organization Consolidated Power. See how they used an industrial cyber protection platform and uncover 4 considerations for IIoT security.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Bayshore Networks

5 Strategies to Improve Your Security Posture
sponsored by Citrix
WHITE PAPER: Reducing business security risk, protecting sensitive customer data, and ensuring compliance with regulations and standards are priorities for all organizations. Explore 5 ways you can overcome these security challenges.
Posted: 02 Aug 2017 | Published: 31 Dec 2016

Citrix
1 - 25 of 1264 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement