IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
151 - 175 of 1392 Matches Previous Page  |  Next Page
Business Perception of IT Security: In the Face of an Inevitable Compromise
sponsored by Kaspersky Lab
WHITE PAPER: Companies unanimously state that cyber threats are highly damaging and that cybersecurity is one of the top requirements for business to stay afloat. Take an in-depth look at this security risk report to reveal where enterprises are seeing the most security attacks.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

Kaspersky Lab

ActivID Authentication Appliance for Enterprise
sponsored by HID Global
WHITE PAPER: While it's a necessity to provide employees, contractors, partners, and customers anytime, anywhere access to appropriate resources, it's also imperative that enterprises are able to maintain their security. Take a look at this white paper to reveal an authentication platform that can help you deliver access to the right users at the right time.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

HID Global

GDPR Primer for the C-Suite and Board of Directors
sponsored by CyberArk Software, Inc
WHITE PAPER: Take a closer look at this white paper to reveal what executives and board members need to know to prepare for the GDPR.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

CyberArk Software, Inc

Achieving a Unified Data Governance Strategy
sponsored by IBM
WHITE PAPER: Learn about recent updates to data governance and its key drivers, such as compliance, self-service analytics, big data, and data monetization.
Posted: 19 Sep 2017 | Published: 31 Jul 2017

IBM

A 5 Minute Guide to Cognitive Search for Customer Support
sponsored by Attivio, Inc.
WHITE PAPER: Explore the basics of a cognitive search platform – from natural language processing to robust security and big data analytics – and find out how cognitive search apps can help contact centers revitalize customer interactions and self-service.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

Attivio, Inc.

Automate Log Management to Meet NIST 800-53 Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST 800-53 requirements. Explore how a log management and analysis platform can help your company meet or exceed these guidelines.
Posted: 15 Sep 2017 | Published: 31 Dec 2014

LogRhythm, Inc.

A 5 Minute Guide to Security for Cognitive Search and Knowledge Management
sponsored by Attivio, Inc.
WHITE PAPER: Examine the resurgence of knowledge management, in conjunction with cognitive search and security, as a viable option for coordinating the vast amounts of information buried in big data environments.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

Attivio, Inc.

The Power of the Proxy
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how the Proxy platform protects you by stopping advanced and evasive malware.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

Symantec & Blue Coat Systems

GDPR Compliance: The Implications for Test Data Management
sponsored by CA Technologies.
WHITE PAPER: Learn about the key implications of GDPR regulations for test data management and explore topics like data masking, synthetic data generation, and more.
Posted: 11 Sep 2017 | Published: 31 Dec 2016

CA Technologies.

GDPR Compliance: How Can You Adapt to the New Regulation?
sponsored by CA Technologies.
WHITE PAPER: The General Data Protection Regulation (GDPR) is set to begin in May 2018 – is your organization ready to comply? Learn from a technology perspective what's needed to comply with the GDPR. Topics covered include data breach reporting, accountability, rights and more.
Posted: 08 Sep 2017 | Published: 08 Sep 2017

CA Technologies.

The Essential Checklist: A Practical Guide to Efficient Security Response
sponsored by ServiceNow
WHITE PAPER: Find out how to detect and resolve data breaches faster by using a security operations checklist to identify which areas of your strategy could benefit most from updated methodologies like security automation.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

ServiceNow

Your Employee Security Checklist: 10 Tips
sponsored by Kaspersky Lab
WHITE PAPER: Careless employees were the single biggest cause of serious incidents involving data loss or leakage— involved in 1 in 5 serious data breaches. Find 10 tips for employee security to prevent serious incidents at the employee level.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Kaspersky Lab

Data Protection: Secure Apps and Data Wherever They Are
sponsored by Veeam Software
WHITE PAPER: If you're beginning to consider upgrading to an availability solution designed to protect apps and data wherever they are — on-premises or in the cloud, on laptops or desktops, virtual machines or physical servers — then this backup/data protection resource was written with you in mind.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Veeam Software

A Guide to Improving Availability and Data Protection in the Hybrid Cloud
sponsored by Veeam Software
WHITE PAPER: The hybrid cloud enables organizations to reduce costs and increase agility – however, you must ensure you are making the shift to the cloud safely, securely, and strategically. Learn how to do so in this white paper.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Veeam Software

7 Steps to Achieve Database Security in the Cloud
sponsored by Trustwave
WHITE PAPER: As organizations increasingly move databases to the cloud to take advantage of the cost savings and flexibility, it's more important than ever to factor in security. Learn 7 steps to cost effective database security in the cloud.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Trustwave

Protecting Patient Data & Complying with HIPAA Security Regulations
sponsored by Trustwave
WHITE PAPER: Data protection is essential – particularly in the health industry. The Health Insurance Portability and Accountability Act (HIPAA) was enacted to protect Personal Health Information (PHI) of patients. Learn how to comply with HIPAA security regulations.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Trustwave

How to Move Data Protection to the Cloud
sponsored by Druva Software
WHITE PAPER: Read this resource to discover 5 considerations for moving your virtual systems data protection to the cloud, including improved business agility, simplified management, and more.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Druva Software

Recovering your Company's PCs Affected by Ransomware
sponsored by Acronis
WHITE PAPER: After a ransomware strike on a PC, your company data is at a serious risk. Read this white paper to learn how to safely protect your company's PCs after a ransomware strike.
Posted: 17 Aug 2017 | Published: 31 Dec 2016

Acronis

Discover a Database and Big Data Scanner
sponsored by Trustwave
WHITE PAPER: This white paper explores the capabilities of a database scanner that allows you to immediately discover, assess, and report on the security, risk, or compliance posture of any database or big data store within your environment (on premise or in the cloud) in minutes.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Trustwave

How 3 Companies Leverage Machine Data to Improve Security, Solve Business & IT Challenges
sponsored by Splunk
WHITE PAPER: One of the most important – and often, most overlooked – resources that an organization can tap into to protect from cyberattacks is machine data. Learn how 3 companies are leveraging machine data to protect themselves against the latest cyberthreats and to address IT operations, IoT and business analytics challenges as well.
Posted: 14 Aug 2017 | Published: 14 Aug 2017

Splunk

Don't Overlook Email When Planning for GDPR Compliance
sponsored by Mimecast
WHITE PAPER: With the GDPR deadline less than a year away, businesses need to focus on their most critical applications, email. Uncover best practices and how to mitigate GDPR risk for email.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Mimecast

Achieving Security Through Data-Driven Intelligence: Splunk for Defense Overview
sponsored by Splunk
WHITE PAPER: In this product guide, learn how Splunk can be used for security purposes, allowing you to achieve security and efficiencies through data-driven intelligence.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Splunk

5 Tips to Slay the Cloud Disaster Recovery Dragon
sponsored by Commvault
WHITE PAPER: As more companies look to the cloud to handle the onslaught of data, current cloud-based data recovery strategies are leaving a lot to be desired. Cloud-based DR may look like a monstrous dragon to some, but this white paper offers five control tips to a more fully enveloped cloud DR strategy. Read on here. .
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Commvault

Achieving GDPR Compliance with Data Governance
sponsored by Infogix
WHITE PAPER: Discover how to meet GDPR compliance requirements with an organization-wide data governance program that relies on collaboration, shared accountability, machine learning analytics, and enhanced data visualizations.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Infogix

Data Protection Done Right
sponsored by AWS- Dell EMC
WHITE PAPER: Dell EMC Data Protection Suite offers an integrated, cloud-optimized solution to help protect your data and meet your SLAs, both on-premises and on AWS.
Posted: 24 Aug 2017 | Published: 31 Jul 2017

AWS- Dell EMC
151 - 175 of 1392 Matches Previous Page    5 6 7 8 9 10    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement