IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
26 - 50 of 1316 Matches Previous Page  |  Next Page
The Essential Checklist: A Practical Guide to Efficient Security Response
sponsored by ServiceNow
WHITE PAPER: Find out how to detect and resolve data breaches faster by using a security operations checklist to identify which areas of your strategy could benefit most from updated methodologies like security automation.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

ServiceNow

Your Employee Security Checklist: 10 Tips
sponsored by Kaspersky Lab
WHITE PAPER: Careless employees were the single biggest cause of serious incidents involving data loss or leakage— involved in 1 in 5 serious data breaches. Find 10 tips for employee security to prevent serious incidents at the employee level.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Kaspersky Lab

Secure app and data delivery for a mobile financial services workforce
sponsored by Citrix
WHITE PAPER: Download this white paper to find out how one company provides a complete digital workspace that delivers secure access to apps, data and services from any device via any network while centralizing apps and data for simplified IT management.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Citrix

Enabling Secure Mobility: Explore 3 Case Studies
sponsored by Citrix
WHITE PAPER: This white paper explores technologies that enable organizations to maintain security, privacy and compliance while evolving their IT environment for mobility.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Citrix

Security Investigation and Rapid Response Using Splunk and AWS
sponsored by Splunk
WHITE PAPER: Cloud is always seen as a security weakpoint--but what if you could turn the cloud to your advantage? By utilizing an analytics-driven approach to security, you can turn your AWS cloud deployments into a security tool. Take a minute to read this white paper and see how you can turn your weakness into an advantage.
Posted: 30 Aug 2017 | Published: 31 Jul 2017

Splunk

Data Protection: Secure Apps and Data Wherever They Are
sponsored by Veeam Software
WHITE PAPER: If you're beginning to consider upgrading to an availability solution designed to protect apps and data wherever they are — on-premises or in the cloud, on laptops or desktops, virtual machines or physical servers — then this backup/data protection resource was written with you in mind.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Veeam Software

A Guide to Improving Availability and Data Protection in the Hybrid Cloud
sponsored by Veeam Software
WHITE PAPER: The hybrid cloud enables organizations to reduce costs and increase agility – however, you must ensure you are making the shift to the cloud safely, securely, and strategically. Learn how to do so in this white paper.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Veeam Software

7 Steps to Achieve Database Security in the Cloud
sponsored by Trustwave
WHITE PAPER: As organizations increasingly move databases to the cloud to take advantage of the cost savings and flexibility, it's more important than ever to factor in security. Learn 7 steps to cost effective database security in the cloud.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Trustwave

Protecting Patient Data & Complying with HIPAA Security Regulations
sponsored by Trustwave
WHITE PAPER: Data protection is essential – particularly in the health industry. The Health Insurance Portability and Accountability Act (HIPAA) was enacted to protect Personal Health Information (PHI) of patients. Learn how to comply with HIPAA security regulations.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Trustwave

How To Meet The New Mandates For European Consumer Data
sponsored by Ivanti
WHITE PAPER: Take an in-depth look at this white paper to reveal how you can meet GDPR requirements and strengthen your data protection strategy.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Ivanti

How to Move Data Protection to the Cloud
sponsored by Druva Software
WHITE PAPER: Read this resource to discover 5 considerations for moving your virtual systems data protection to the cloud, including improved business agility, simplified management, and more.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Druva Software

Trust Must Be The Foundation Of Your B2B Digital Ecosystem
sponsored by IBM
WHITE PAPER: This Forrester report discusses the fundamental role trust plays in your digital transformation strategy. Learn about trust in the B2B context and analyzes the key technologies, processes, and operational values that CIOs and their teams must use to build and maintain trusted ecosystem partnerships.
Posted: 30 Aug 2017 | Published: 29 Mar 2017

IBM

6 Reasons to Choose the Dell EMC Data Protection Suite Family
sponsored by Dell EMC and Intel®
WHITE PAPER: Access this resource to discover 6 essential features every data protection suite must have. Whether on-premises or in the cloud, see how one suite centralizes monitoring, analysis, and reporting, as well as enables global management of data copies across primary and protection storage.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

Dell EMC and Intel®

Why In-cloud Data Protection Architecture Matters to a Modern IT Infrastructure
sponsored by Dell EMC and Intel®
WHITE PAPER: ESG evaluates in-cloud data protection in this white paper, which will centralize, automate, and accelerate backup and recovery in your organization. Access now to see, in this vein, an economic analysis of Dell EMC Protection Software, with the storage and compute efficiency of their data protection-optimized cloud storage appliance highlighted.
Posted: 29 Aug 2017 | Published: 30 Jun 2017

Dell EMC and Intel®

Top Areas to Look for in Data Protection Tools
sponsored by Dell EMC and Intel®
WHITE PAPER: We are entering an era where data is your most valuable asset. You need a data protection tool to ensure that your data stays yours. This white paper gives you 8 key focus areas to evaluate when making your data protection decision.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

Dell EMC and Intel®

How to Block Malicious File Uploads
sponsored by OPSWAT inc
WHITE PAPER: File uploads offer an attack vector to cybercriminals. This white paper describes the best ways to prevent malicious file uploads and the keys to protecting your sensitive data.
Posted: 29 Aug 2017 | Published: 29 Aug 2017


As Learning Hinges On Devices And Applications, Challenges Increase For IT
sponsored by IBM
WHITE PAPER: Explore the importance of putting security measures in place to restrict apps, documents and data to specific users and groups, ensuring sensitive data does not end up in the wrong hands. Learn from the education industry on how endpoint management can help you achieve stronger data security.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

IBM

Making Cloud Work for Business
sponsored by NTT Communications Corporation
WHITE PAPER: Download this resource to learn how in just 5 short steps, you can take ahold of your cloud initiative, and overcome the biggest barrier to adoption—security.
Posted: 28 Aug 2017 | Published: 31 Dec 2016

NTT Communications Corporation

How Stronger Governance Enables Distributed BI
sponsored by Qlik
WHITE PAPER: Find out how to overcome challenges like lingering data silos, data security, and establishing a single source of truth. Learn how a strong governance program and a distributed BI model can optimize BI and analytics.
Posted: 25 Aug 2017 | Published: 31 Dec 2016

Qlik

Eliminating Access Blind Spots
sponsored by RSA
WHITE PAPER: 63% of data breaches involve compromised identities, according to the 2017 Verizon DBIR. Uncover how to enhance your security posture with multi-factor authentication that can mitigate potential risks prior to them causing trouble.
Posted: 24 Aug 2017 | Published: 24 Aug 2017

RSA

6 Key Steps to Successful Identity Assurance
sponsored by RSA
WHITE PAPER: Uncover guidance on the six key elements to identity assurance and how to increase security while optimizing the end user's experience. Learn how to deliver access to users that's both convenient and secure.
Posted: 24 Aug 2017 | Published: 24 Aug 2017

RSA

Preventing Known and Unknown Threats
sponsored by OPSWAT inc
WHITE PAPER: Preventing known and unknown threats is essential for boosting security platforms. Read this white paper to take an in-depth look at the advantages and disadvantages of single-malware products vs. the value of multi-scanning.
Posted: 22 Aug 2017 | Published: 22 Aug 2017


Secure Your VDI If You Don't Wanna Cry Again
sponsored by Citrix Ready
WHITE PAPER: Virtual desktop infrastructures (VDIs) are a popular option for those looking to connect and work with their data from anywhere in the world. It would be easy enough for WannaCry to piggyback its way into your system. This upcoming webcast will teach you how to protect your virtualized environment and key best practices for doing so.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Citrix Ready

Achieving GDPR Compliance with Data Governance
sponsored by Infogix
WHITE PAPER: Discover how to meet GDPR compliance requirements with an organization-wide data governance program that relies on collaboration, shared accountability, machine learning analytics, and enhanced data visualizations.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Infogix

Data Protection Done Right
sponsored by AWS- Dell EMC
WHITE PAPER: Dell EMC Data Protection Suite offers an integrated, cloud-optimized solution to help protect your data and meet your SLAs, both on-premises and on AWS.
Posted: 24 Aug 2017 | Published: 31 Jul 2017

AWS- Dell EMC
26 - 50 of 1316 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement