IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
101 - 125 of 1320 Matches Previous Page  |  Next Page
5 Tips to Slay the Cloud Disaster Recovery Dragon
sponsored by Commvault
WHITE PAPER: As more companies look to the cloud to handle the onslaught of data, current cloud-based data recovery strategies are leaving a lot to be desired. Cloud-based DR may look like a monstrous dragon to some, but this white paper offers five control tips to a more fully enveloped cloud DR strategy. Read on here. .
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Commvault

Overcome Security Barriers to the Cloud
sponsored by Commvault
WHITE PAPER: Learn how to enable data security features in the cloud to avoid costly data breaches. As a bonus, discover 4 other barriers to the cloud and how to overcome these challenges.
Posted: 09 Aug 2017 | Published: 31 Dec 2015

Commvault

Achieve Governed Self-Service Analytics at Scale
sponsored by Tableau Software
WHITE PAPER: Uncover 4 steps for successfully deploying governed self-service analytics so that you can meet the growing need for self-service analytics while still ensuring a high standard of data governance, trust, security, and monitoring.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Tableau Software

Data Governance for Self-Service Analytics
sponsored by Tableau Software
WHITE PAPER: Learn how to create a data governance strategy for self-service analytics by uncovering the 4 essential elements of a refined data governance strategy. Plus, discover how to create mobile and cloud support for you data management and security initiatives.
Posted: 08 Aug 2017 | Published: 08 Aug 2017

Tableau Software

How EMM Can Help With GDPR Compliance
sponsored by MobileIron
WHITE PAPER: Explore how a comprehensive EMM program can be an important part of your GDPR compliance initiative. Uncover an overview of GDPR principles, 7 tips to deploy EMM for GDPR compliance, and more.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

MobileIron

The Security Benefits of Prioritizing Critical Data Assets
sponsored by InteliSecure
WHITE PAPER: Do you know what your critical data assets are? This 6-part white paper explores how to define your critical data assets so you can save time and money, all while improving your security posture.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

InteliSecure

How to Create a Cybersecurity Policy for Your Organization
sponsored by HelpSystems
WHITE PAPER: Discover a 4-step plan to build a cybersecurity policy for your organization. As a bonus, uncover additional resources to create a data breach response plan.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

HelpSystems

The Race to Meet GDPR Compliance
sponsored by HyTrust
WHITE PAPER: No matter where you are in the world, if you do business within the EU, you need to be prepared for GDPR compliance. This white paper provides an overview of the GDPR so you can get ready.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

HyTrust

Securing Industrial IoT Technology: 4 Key Considerations
sponsored by Bayshore Networks
WHITE PAPER: Learn how to stop cyberthreats before they can damage critical industrial assets and systems by going inside one cyberattack launched against energy organization Consolidated Power. See how they used an industrial cyber protection platform and uncover 4 considerations for IIoT security.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Bayshore Networks

80/20: The New and Not-So New World of OT and IoT Security
sponsored by Atos
WHITE PAPER: This white paper explores the new environments of operational technology (OT) and the Internet of Things (IoT), acknowledging the risks within, with proven security tools and practices. Learn how to use the new 80/20 rule to navigate and simplify OT and IoT into manageable segments.
Posted: 02 Aug 2017 | Published: 26 Jul 2017

Atos

The Future of I.T. Security starts with Virginia Tech
sponsored by Virginia Tech Online
WHITE PAPER: Data breaches are costly – in revenue and reputation – and organizations are actively looking for talented professionals who can help protect data stores. Learn what issues are keeping CIOs up at night, and the career opportunities available in this growing field.
Posted: 28 Jul 2017 | Published: 28 Jul 2017

Virginia Tech Online

Protect Your Sensitive Data, Achieve Compliance In a Multi-Cloud World
sponsored by HyTrust
WHITE PAPER: Multi-cloud adoption is on the rise – a recent study found that 64% of survey respondents expect to use multiple cloud service vendors. With such a rising popularity, how do you protect your sensitive data, while also properly complying, in a multi-cloud future?
Posted: 25 Jul 2017 | Published: 25 Jul 2017

HyTrust

Reducing Risk and Increasing Flexibility for the Mobile Enterprise
sponsored by Citrix
WHITE PAPER: Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

4 Ways to Reduce the Risk of Ransomware
sponsored by Citrix
WHITE PAPER: In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

3 Ways EFSS Enables Secure Content Collaboration
sponsored by Citrix
WHITE PAPER: The sudden influx of personal devices, mobile apps, and cloud technologies requires you to establish new ways to safely share data and documents. This white paper discusses the importance of enterprise file sync and share (EFSS) in securing the future of your digital workplace.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

Citrix

The Data Economy Report: 2017 Edition
sponsored by Pure Storage
WHITE PAPER: IT has been, willingly or otherwise, thrust into the spotlight and cloud is seeing explosive growth. Access this report to learn why organizations are flocking to the cloud for salvation from the rising seas of data.
Posted: 12 Jul 2017 | Published: 12 Jul 2017

Pure Storage

Air-Gap, Isolated Recovery, and Ransomware: Cost vs. Value
sponsored by Rubrik
WHITE PAPER: Have you been thinking about air-gapping your infrastructure with scheduled updates to protect against ransomware? Download this resource to examine a thorough profile detailing isolated recovery—including its limitations—and determine its effectiveness in confronting undetected ransomware file encryption.
Posted: 26 Jun 2017 | Published: 26 Jun 2017

Rubrik

Analyzing the Malware Threat
sponsored by Symantec
WHITE PAPER: Find out how malware is evolving to circumvent commonly used defensive measures by learning to avoid behavior detection. Learn more about how this advanced malware functions, how to identify it, and how to neutralize it with cloud generation malware analysis.
Posted: 14 Jun 2017 | Published: 28 Feb 2017

Symantec

The App is the Endpoint
sponsored by Blue Cedar
WHITE PAPER: Uncover 5 fundamental reasons why security leaders are moving away from a device management paradigm and instead are focusing on treating the app as the endpoint.
Posted: 14 Jun 2017 | Published: 31 Dec 2016

Blue Cedar

Solving Fundamental Data Quality Challenges
sponsored by BDNA
WHITE PAPER: Data quality is one of the most important requirements for IT asset management (ITAM) and IT service management (ITSM). Find out what you need to do in the rationalization, refresh, security, automation and planning steps to improve your data quality, and your overall quality of life.
Posted: 01 Jun 2017 | Published: 31 May 2017

BDNA

Transform IT and Reduce Risk With Converged Infrastructure and Availability Software
sponsored by Veeam Software
WHITE PAPER: This white paper discusses how converged infrastructure systems can be leveraged in tandem with availability tools to significantly enhance application availability, improve business agility, simplify IT operational management, lower costs, and mitigate risk.
Posted: 31 May 2017 | Published: 31 May 2017

Veeam Software

Reliable Data Protection Designed for Virtualized Environments
sponsored by Veeam Software
WHITE PAPER: Modernizing your data center can seem overwhelming, especially when you consider the exponential data growth you can expect to realize every year. Access this white paper to learn about data protection and backup for virtualized environments.
Posted: 31 May 2017 | Published: 29 Apr 2016

Veeam Software

Information Protection in the Web and Cloud Era
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Explore a modern approach to data protection in the web and cloud era. Uncover 5 requirements for a modern DLP tool.
Posted: 26 May 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

Safe Adoption of Cloud Applications
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Gartner predicts that nearly 40% of enterprise IT application spend will be shifted to cloud versus on-premise by 2020. Access this white paper for major considerations you will need to focus on when looking for cloud app security.
Posted: 26 May 2017 | Published: 26 May 2017

Symantec & Blue Coat Systems

Fast Track Containers to Production
sponsored by Diamanti
WHITE PAPER: Discover how to fast track containers to production, increase your scalability, address containerized app requirements with converged infrastructure, enable automatic persistent storage for containers, and more.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Diamanti
101 - 125 of 1320 Matches Previous Page    3 4 5 6 7 8    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement