IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
101 - 125 of 1537 Matches Previous Page  |  Next Page
How Sarbanes-Oxley Act (SOX) Compliance is Impossible without Privileged Management
sponsored by Dell Software
WHITE PAPER: This white paper addresses IT security compliance from an auditor's perspective. Access now to help your organization achieve and prove compliance with other security mandates as well.
Posted: 06 May 2016 | Published: 31 Dec 2015

Dell Software

Barracuda NG Firewall Model F1000
sponsored by Barracuda Networks
WHITE PAPER: This white paper shows you how to centrally control your security system to prevent it from weakening over time as the infrastructure evolves. Learn how to strengthen your perimeter firewall protection while enabling flexibility to allow for change in the future.
Posted: 06 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Cost of Data Breach – Impact of Business Continuity Management
sponsored by IBM
WHITE PAPER: This report examines two factors that affect the financial consequences of a data breach. The first is executive involvement security strategy and response to data breaches. The second is the purchase of cyber insurance to mitigate the cost of a data breach. Access now to learn how to best mitigate cyber breaches and protect reputation.
Posted: 06 May 2016 | Published: 01 May 2015

IBM

Deliver reliable, fast, and secure networks for improved APM
sponsored by Ixia
WHITE PAPER: How can an intelligent visibility framework provide smarter application performance monitoring and enhance security tools? Get an overview of the benefits of these tools and what's needed to create a fast, reliable and secure network for greater customer satisfaction.
Posted: 06 May 2016 | Published: 01 Mar 2016

Ixia

Blue Skies Ahead? The State of Cloud Adoption
sponsored by Intel Security
WHITE PAPER: IT needs greater visibility to achieve better trust in cloud security. This comprehensive report reveals the results of a survey conducted with 1,200 IT decision-makers across 8 different countries about the security challenges they've faced with cloud adoption.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security

Data Breach Digest 2016: 500 cybersecurity incidents investigated
sponsored by Verizon
WHITE PAPER: 84-page Data Breach Digest shines a light on some of the most prevalent incident scenarios to show you what you can do in the face of disaster. Access now to learn how you can best mitigate threats in the future.
Posted: 05 May 2016 | Published: 01 Apr 2016

Verizon

Get Ahead of Your Next Security Breach
sponsored by Dell Software
WHITE PAPER: An outline of the five steps you can take to protect your organization from the inherent risks of privileged accounts.
Posted: 05 May 2016 | Published: 31 Dec 2015

Dell Software

Strategies for Successfully Managing Privileged Accounts
sponsored by Dell Software
WHITE PAPER: The problem with many PAM programs is that they address only one or two of the underlying issues, leaving your organization insecure. Is your privileged identify management program on the right path? Sanity check inside.
Posted: 05 May 2016 | Published: 31 Dec 2015

Dell Software

Disrupting Targeted Attacks Solution Guide
sponsored by Intel Security
WHITE PAPER: Reduce complexity, response time and operational costs while simultaneously improving your security posture in the face of growing risks. Access now and find out how to synthesize your IT operations and security controls to form an agile, increasingly automated (and rock-solid) security architecture.
Posted: 05 May 2016 | Published: 01 Apr 2016

Intel Security

CISO Strategies to Fight Cybercrime
sponsored by IBM
WHITE PAPER: This report outlines how CISOs are stepping up cybersecurity efforts to focus on addressing one of the most prevalent underlying issues globally – a programmatic focus on compliance instead of risk-based outcomes. Access now to learn what strategies security leaders are using to transform their organizations.
Posted: 05 May 2016 | Published: 01 Oct 2015

IBM

The Evolution of Wireless Business Continuity
sponsored by Accelerated Concepts
WHITE PAPER: Discover in this white paper how to avoid expensive outages and downtime that drastically impact your reputation by formulating a business continuity plan with first-class connectivity. Learn how to take advantage of the expanding IoT to back up your business-critical data, devices, and more.
Posted: 05 May 2016 | Published: 31 Jan 2016

Accelerated Concepts

What is Advanced Hybrid Security?
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Are you prepared for complex attacks on your network? Learn how advanced hybrid security solutions meet you where you are and get you to the level of security you need.
Posted: 05 May 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

Navigating Email Security
sponsored by ZixCorp
WHITE PAPER: Learn how to protect against email data breaches with an overview of the three key groups with which to classify your emails.
Posted: 05 May 2016 | Published: 01 Apr 2016

ZixCorp

Survey Results: Mapping the Cloud Maturity Curve
sponsored by IBM
WHITE PAPER: This resource presents survey results on cloud maturity. Discover the 5 essential characteristics of high-maturity organizations, and learn about the biggest challenges that hold enterprises back from achieving cloud maturity.
Posted: 05 May 2016 | Published: 05 May 2016

IBM

Advancing Cyber-Security Measures Inside
sponsored by VMware
WHITE PAPER: In this infographic, discover how to secure your network and data center from the inside and bolster your existing perimeter defenses.
Posted: 05 May 2016 | Published: 01 Apr 2016

VMware

4 Ways Data Loss Prevention Can Help Meet More Stringent HIPAA Enforcement
sponsored by Digital Guardian
WHITE PAPER: Implemented correctly, data loss prevention (DLP) can help your organization maintain HIPAA compliance. This white paper reviews 4 specific HIPAA statutes and how DLP helps your organization comply with each.
Posted: 04 May 2016 | Published: 01 Apr 2016

Digital Guardian

Control and Secure Sensitive Data
sponsored by Citrix
WHITE PAPER: Enterprise file sync and sharing (EFSS) services have become valuable tools as they allow organizations to delve into mobility without compromising data security or compliance. Access this resource to learn about an EFSS service that provides IT teams with flexibility, visibility and control over sensitive data.
Posted: 04 May 2016 | Published: 30 Dec 2015

Citrix

Securing Real-Time Mobile Communications
sponsored by Mitel Networks Limited
WHITE PAPER: This white paper offers contemporary real-time communications services that are secured end-to-end. Allow employees to communicate remotely through any device using strict identity management tools that ensure your information won't be sent to anyone without proper authorization.
Posted: 04 May 2016 | Published: 01 Apr 2016

Mitel Networks Limited

ZK Research Report on Network Management Issues
sponsored by Ixia
WHITE PAPER: ZK Research (a Zeus Kerravala company) conducted a network management survey and inside reviews the results, including the need for application strengthening and the market forces driving this need.
Posted: 04 May 2016 | Published: 01 Apr 2016

Ixia

Client Virtualization Solutions For Government Deliver Increased Security, Mobility, and Savings
sponsored by Dell, Inc., Intel and VMware
WHITE PAPER: Find out how client virtualization can help to overcome traditional client PC security and mobility challenges and enable a more secure, mobile workforce for government agencies. You'll learn how moving sensitive data from local device storage to the data center decreases endpoint security threats.
Posted: 04 May 2016 | Published: 04 May 2016

Dell, Inc., Intel and VMware

Ensuring Document Security Across Any Device
sponsored by BlackBerry
WHITE PAPER: Mobile devices have become more common in the workplace and produced a goal of ensuring that sensitive documents can be shared and accessed securely from any device. Access this white paper to learn about a solution that circumvents device management and instead allows for management of the documents themselves.
Posted: 04 May 2016 | Published: 05 Apr 2016

BlackBerry

Client Virtualization Solutions For Retail Deliver Better Security, Enhanced Customer Interactions, and Reduced Cost
sponsored by Dell, Inc., Intel and VMware
WHITE PAPER: This white paper explores how client virtualization solutions are making it easier to secure customer information while improving customer interactions throughout the shopping experience
Posted: 04 May 2016 | Published: 04 May 2016

Dell, Inc., Intel and VMware

Gartner Magic Quadrant for Intrusion Prevention Systems
sponsored by Intel Security
WHITE PAPER: This Magic Quadrant report direct from Gartner ranks the best (and worst) network intrusion prevention system vendors.. Plus you find out why the network IPS market continues being absorbed by next-generation firewall placements at the perimeter. (Hint: they offer some of the best protection with advanced threat defense solutions now in place.)
Posted: 04 May 2016 | Published: 16 Nov 2015

Intel Security

Information Sharing Defeats Data Security Threats
sponsored by Anomali
WHITE PAPER: This white paper teaches you about information sharing to quell security problems. Learn how to share information with trusted peers adhere to standards and integrate ith popular security software. Access now to enable information sharing that best suits your business' needs.
Posted: 04 May 2016 | Published: 01 Apr 2016

Anomali

It’s Time to Get Real With SDN and NFV
sponsored by Accelerated Concepts
WHITE PAPER: This white paper shows you a universal network appliance that uses NFV technology and comes at a price point that sets a breakthrough standard for the entire industry. Access now to learn about a simple, inexpensive and open path to SDN to develop new services, improve network performance and drive new business opportunities.
Posted: 04 May 2016 | Published: 01 Apr 2016

Accelerated Concepts
101 - 125 of 1537 Matches Previous Page    3 4 5 6 7 8    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement