IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
101 - 125 of 1274 Matches Previous Page  |  Next Page
Print Management Receives Top Marks at Edinburgh College
sponsored by Nuance
WHITE PAPER: This brief case study pinpoints the advantages of an effective MFP strategy, using Edinburgh College as an example. Discover the ways deploying and standardizing your print infrastructure drives budget-friendly solutions and prevents breaches.
Posted: 12 May 2015 | Published: 31 Dec 2014

Nuance

Case Study: A Swiss Bank Modernizes its Print Fleet
sponsored by Nuance
WHITE PAPER: This brief case study pinpoints the benefits of updating your print infrastructure, using a major Swiss bank as an example. Discover how reducing your printer fleet can save green in more ways than one.
Posted: 12 May 2015 | Published: 12 May 2015

Nuance

Research Report: The Benefits of Security Analytics
sponsored by Prelert
WHITE PAPER: Read this report to discover what IT pros have to say about security analytics' most useful features, its value, and more.
Posted: 05 May 2015 | Published: 30 Apr 2015

Prelert

Financial Organizations: Controlling Secure Communications
sponsored by IntraLinks, Inc
WHITE PAPER: In this white paper, you will learn how to build more structured and controlled processes for assembling, refining, and sharing information. View now to examine several case studies presenting common financial information sharing challenges and how to craft your security strategy to overcome them.
Posted: 04 May 2015 | Published: 30 Apr 2015

IntraLinks, Inc

Controlling Keys - How to Prevent Data Leaks
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores an alternative keys strategy that only the consumer can directly acess over a protected communications channel. View now to learn how to control access to encrypting and decrypting cloud stored files and how you can prevent data leaks.
Posted: 04 May 2015 | Published: 22 Apr 2015

IntraLinks, Inc

Breaking Bad: The Risk of Insecure File Sharing
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores the risks and vulnerabilities of using file sync and share solutions and ungoverned practices. Read on to learn the 11 key steps to protecting data in the collaborative file-sharing environment.
Posted: 01 May 2015 | Published: 15 Oct 2014

IntraLinks, Inc

Running the Risk: Why a Generation of Sharing Could Be Good for Business
sponsored by Aruba Networks
WHITE PAPER: This insightful research report discusses how businesses can develop a mobile-aware culture that nurtures innovation, collaboration, and productivity, while minimizing the risk of data loss.
Posted: 01 May 2015 | Published: 01 May 2015

Aruba Networks

Big Data Analytics: Safety in the Digital Era
sponsored by SAS
WHITE PAPER: Cybercriminals cause a lot of damage. They destroy profits, erode customers' trust, and compromise safety. This white paper identifies the ways in which big data analytics improve online safety and security. Read on and explore the efficacy of big data analytics when faced with fraudsters.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

SAS

Securing the Mobile Enterprise Environment
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore best practices for addressing security issues for the mobile enterprise environment, including those for establishing secure mobile access and mobile device security. Discover solutions designed to help your organization maintain tight network and mobile device security while still enhancing employee productivity.
Posted: 29 Apr 2015 | Published: 30 Sep 2014

Dell, Inc. and Intel®

Why a Secure Enterprise Workspace is the Best Approach for Mobile Productivity
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Inside this white paper, explore how a secure enterprise workspace can help to improve mobile productivity while meeting your organizations requirements for security, manageability, and configurability.
Posted: 28 Apr 2015 | Published: 27 Feb 2015

Dell, Inc. and Intel®

The Security and Regulatory Drivers for Information Rights Management
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper examines IT's complex dichotomy of document protection versus access in the mobile age, while issuing the consequences of inadequate security. Read on to ensure that your organization is avoiding the business issues that impact the information security management of corporate documents and content.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

IntraLinks, Inc

Advanced Threat Protection for Dummies
sponsored by Blue Coat Systems
WHITE PAPER: This free e-book gives you essential information on advanced threat protection (ATP), including tips for using big data security analytics and best practices for advanced threat mitigation.
Posted: 28 Apr 2015 | Published: 31 Dec 2013

Blue Coat Systems

The Secure Mobile Enterprise
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

Dell, Inc. and Intel®

Data Center Security: A Comprehensive Guide to Mitigating Data Center Risks
sponsored by Alcatel-Lucent
WHITE PAPER: Read this white paper to learn about a holistic approach to data center security that will detect more threats, launch more effective counterattacks and better protect your data overall.
Posted: 27 Apr 2015 | Published: 31 Dec 2012

Alcatel-Lucent

Virtual Data on Tape: Challenges and Benefits
sponsored by Veeam Software
WHITE PAPER: This white paper examines the benefits of storing virtual data on tape including reduced storage costs, improved data protection, and more.
Posted: 22 Apr 2015 | Published: 16 Dec 2014

Veeam Software

Security Strategies for Today's Data Warehouses
sponsored by IBM
WHITE PAPER: This white paper discusses the necessity of an end-to-end security strategy for data warehouses and gives tips for building that kind of strategy.
Posted: 22 Apr 2015 | Published: 17 Jul 2013

IBM

How to Avoid Today's Top 8 Enterprise Mobility Security Issues
sponsored by BlackBerry
WHITE PAPER: This helpful resource presents the top 8 mobile security risks that you need to be on top of right now in order to protect your business, and also provides a questionnaire designed to elucidate and resolve the gaps in your approach to mobile security.
Posted: 22 Apr 2015 | Published: 12 Dec 2014

BlackBerry

7 Best Practices for Securing Hadoop
sponsored by IBM
WHITE PAPER: This white paper explores how to develop a data life-cycle-centric approach to Hadoop security by asking yourself five integral questions. Access now to learn the 7 step program to improving your security strategy.
Posted: 21 Apr 2015 | Published: 11 Apr 2014

IBM

4 Steps to A Proactive Big Data Security and Privacy Strategy
sponsored by IBM
WHITE PAPER: This white paper outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe without hindering user performance.
Posted: 21 Apr 2015 | Published: 18 Jun 2014

IBM

The Digital Guardian Managed Security Program (MSP) Technical Overview
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will learn how to simplify managing sensitive data and intellectual property protection.  Access now to learn more.
Posted: 20 Apr 2015 | Published: 18 Feb 2015

Digital Guardian

Implementing a Proactive Strategy For Data Security
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to implement a proactive data security strategy using a 5-step approach. Access this resource now to discover how to overcome common data security struggles.
Posted: 17 Apr 2015 | Published: 17 Sep 2014

IBM

Gaining Visibility, Meaningful Information Security, and Fraud Data in Seconds
sponsored by White Hat Security
WHITE PAPER: In this white paper, you'll discover how to use big data for InfoSec and fraud analytics to strengthen your security strategy.
Posted: 16 Apr 2015 | Published: 18 Dec 2014

White Hat Security

Evaluating the Total Cost of Ownership for Protecting Web Applications
sponsored by White Hat Security
WHITE PAPER: This white paper breaks down the tocal cost of web app security in the three major risk categories associated with sucessful attacks. Access now to learn how to quantify the costs of web app security compared to the costs of a breach.
Posted: 16 Apr 2015 | Published: 14 Oct 2013

White Hat Security

Programmatically Identifying Multi-Page Flaws in Web Apps
sponsored by White Hat Security
WHITE PAPER: This white paper details the pros and cons of several web app scanning approaches. View now to learn learn more.
Posted: 15 Apr 2015 | Published: 31 Dec 2013

White Hat Security

Mobility in Government Services
sponsored by BlackBerry
WHITE PAPER: Access this white paper to learn how to get the most out of your EMM compliance strategy. View now to explore a helpful checklist.
Posted: 15 Apr 2015 | Published: 17 Dec 2014

BlackBerry
101 - 125 of 1274 Matches Previous Page    3 4 5 6 7 8    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement