IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
151 - 175 of 1276 Matches Previous Page  |  Next Page
Increase Productivity and Reduce Risk with Secure File Sharing & Collaboration
sponsored by BlackBerry
WHITE PAPER: This white paper highlights an EFSS solution that allows you to take control over your data, combining the benefits of productivity and collaboration with security. Bolster your business against third-party threats with 6 steps for deploying secure EFSS.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

BlackBerry

The State of Application Delivery in APAC 2015
sponsored by F5 Networks
WHITE PAPER: In the following infographic, you will discover all you need to know about the state of application delivery in APAC in 2015. Discover why organizations are finding that success depends on the effectiveness of their security infrastructure.
Posted: 09 Oct 2015 | Published: 09 Oct 2015

F5 Networks

State of File Collaboration Security
sponsored by FinalCode
WHITE PAPER: Access this research report on file collaboration security for insights into file data leakage risks, security processes and control maturity, perceived cloud-based file platform threats, and more.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

FinalCode

Case Study: File-Sharing Security that Doesn't Sacrifice Efficiency
sponsored by FinalCode
WHITE PAPER: Access this case study to discover how one business found a secure file-sharing solution that didn't hinder worker efficiency.
Posted: 05 Oct 2015 | Published: 30 Apr 2015

FinalCode

Evaluating the Total Cost of Ownership for Protecting Web Applications
sponsored by WhiteHat Security
WHITE PAPER: This white paper breaks down the total cost of web app security in the three major risk categories associated with successful attacks. Access now to learn how to quantify the costs of web app security compared to the costs of a breach.
Posted: 01 Oct 2015 | Published: 14 Oct 2013

WhiteHat Security

Programmatically Identifying Multi-Page Flaws in Web Apps
sponsored by WhiteHat Security
WHITE PAPER: This white paper details the pros and cons of several web app scanning approaches. View now to test your web apps' functions independently, automatically detect the presence of common nonce frameworks, and more.
Posted: 01 Oct 2015 | Published: 31 Dec 2013

WhiteHat Security

Gaining Visibility, Meaningful Information Security, and Fraud Data in Seconds
sponsored by WhiteHat Security
WHITE PAPER: In this white paper, you'll discover how to use big data for InfoSec and fraud analytics to strengthen your security strategy.
Posted: 01 Oct 2015 | Published: 18 Dec 2014

WhiteHat Security

Enterprise Security in Asia 2015: The Ugly, The Bad & The Good
sponsored by F5 Networks
WHITE PAPER: This white paper reveals the truth about cybersecurity in Asia including a 52% surge in breaches and the emerging sophisticated schemes from hackers. View now to learn which attacks are most popular and how to avoid being the next data breach victim.
Posted: 01 Oct 2015 | Published: 13 Jan 2015

F5 Networks

Key Considerations For Protecting Data on All-Flash Arrays
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper argues how flash-integrated flat backup protects data better and is more efficient than traditional backup methods. Read on to learn how data protection can be a function of primary storage, eliminating the need for traditional backup.
Posted: 22 Sep 2015 | Published: 31 Jul 2015

Hewlett Packard Enterprise

The Service Provider's Guide to Flash Storage Selection
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper discusses what flash storage can bring to the service provider and how you can choose the flash storage solution that best keeps your customers satisfied.
Posted: 21 Sep 2015 | Published: 25 Aug 2015

Hewlett Packard Enterprise

Enabling the Connected Campus: Mobility Best Practices for Higher Education
sponsored by VMware, Inc.
WHITE PAPER: IT teams on college campuses won't want to miss this helpful resource, which explores the following steps to protecting students' financial and personal information from the risks of BYOD in higher education. View now to learn how to choose the right EMM solution, prepare your network infrastructure, manage apps and content, and more.
Posted: 15 Sep 2015 | Published: 15 Sep 2015

VMware, Inc.

Secure-by-Design Protection for Application and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to protect them.
Posted: 14 Sep 2015 | Published: 22 May 2014

Citrix

Mitigating the Top 3 Office 365 Security Risks
sponsored by Mimecast
WHITE PAPER: This white paper examines how to mitigate the 3 key high risk areas of Office 365 email security.
Posted: 14 Sep 2015 | Published: 02 Sep 2015

Mimecast

Protection from Targeted Attacks
sponsored by Mimecast
WHITE PAPER: This white paper introduces a comprehensive form of threat protection that will keep out even today's advanced hacks.
Posted: 11 Sep 2015 | Published: 31 Dec 2014

Mimecast

Enabling and Optimizing Hybrid IT Operations
sponsored by IBM
WHITE PAPER: This informative document offers advice on how to implement an intelligent hybrid IT security approach that will effectively protect your data. Read how best to incorporate a seamless, new generation of security services
Posted: 11 Sep 2015 | Published: 31 Jul 2015

IBM

The Credit Union's Cyber-Security Crisis
sponsored by SurfWatch Labs
WHITE PAPER: This white paper addresses the security issues of credit unions, discussing how you can distribute your resources to provide the best security in the most cost-effective manner.
Posted: 09 Sep 2015 | Published: 09 Sep 2015

SurfWatch Labs

How to Virtualize Disaster Recovery with Cloud Computing
sponsored by IBM
WHITE PAPER: This white paper outlines how your business can grow securely and thrive in the expanding data universe, bolstered by one enterprise-grade, cloud-enabled disaster planning platform. Access this white paper to learn more about how cloud-based business resilience can provide an alternative to traditional disaster recovery.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

IBM

Cloud Strategy: How to Limit Risk and Downtime
sponsored by IBM
WHITE PAPER: This white paper explores a cloud strategy that dramatically reduces risk and downtime through the latest virtualization technologies. Discover how cloud resilience can ease the restoration of servers, apps and data, improve the security of data, and more.
Posted: 04 Sep 2015 | Published: 30 Sep 2014

IBM

The Critical Need for Enterprise-Grade File Sync and Share
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper introduces methodologies for mitigating risks associated with consumer-focused file sync and share (CFSS) and lowering the costs of managing corporate information. Learn how enterprise-grade file sync and sharing (EFSS) will enable continued efficiency for users, while putting IT back in charge of corporate content.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

IntraLinks, Inc

Business Continuity: How to Enhance Your Strategy
sponsored by IBM
WHITE PAPER: This white paper explores the process of creating a more pragmatic and appropriate business continuity response to mitigate operational risk. Read on to learn how to create a smarter, more agile business continuity management framework, and discover 3 case studies for this strategy.
Posted: 04 Sep 2015 | Published: 30 Apr 2015

IBM

Are You Getting the Most from Your Hybrid IT Environment?
sponsored by IBM
WHITE PAPER: In this white paper, you will discover how to find the right sourcing provider for your organization, and determine the effectiveness of managed service providers in hybrid IT environments. Access this paper now to take advantage of scalable service integration and cloud management.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

IBM

Private Cloud: A Compelling Infrastructure Delivery Model
sponsored by SolidFire
WHITE PAPER: Access this white paper to uncover 5 key benefits of building a private cloud and learn why these characteristics make private cloud a compelling infrastructure delivery model to many organizations.
Posted: 31 Aug 2015 | Published: 31 Aug 2015

SolidFire

Linking resiliency to business objectives: How to make a case for corporate investment
sponsored by IBM
WHITE PAPER: This white paper serves as a guideline for IT professionals, and explains how to generate investment for resiliency initiatives by linking IT risks to business risk using one resiliency services framework. Access this white paper to learn how to uncover the critical connections between IT and the business.
Posted: 31 Aug 2015 | Published: 31 May 2015

IBM

Fort Knox or House of Cards: What Did Our Data Protection Survey Reveal?
sponsored by arcserve
WHITE PAPER: This white paper discusses the prevalence of flawed data protection strategies, drawing on survey results to show just where the average organization stands and how it needs to improve.
Posted: 21 Aug 2015 | Published: 21 Aug 2015

arcserve

Top 8 Identity and Access Management Challenges with Your SaaS Applications
sponsored by Okta
WHITE PAPER: Read this whitepaper to learn the eight main IAM challenges associated with cloud and SaaS application deployment and what you can do to address them. Dive in and discover how you can ensure your company is getting the most out of their SaaS investment.
Posted: 01 Sep 2015 | Published: 30 Nov 2012

Okta
151 - 175 of 1276 Matches Previous Page    5 6 7 8 9 10    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement