IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
26 - 50 of 1266 Matches Previous Page  |  Next Page
Data Protection for Higher Education
sponsored by Acronis
WHITE PAPER: Access this white paper to discover why it's important to protect institution data and the challenges that higher education institutions face with data protection.
Posted: 07 Jul 2015 | Published: 31 Mar 2015

Acronis

A Focus on Cloud Security, So You Can Focus on Business
sponsored by SAP
WHITE PAPER: This white paper stresses the critical importance of information protection in a cloud environment. Discover ways to implement security controls and practices in your SaaS strategy.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

SAP

Taking Control of File Sharing Services
sponsored by Mimecast
WHITE PAPER: This white paper discusses the security challenges of cloud-based file sharing services and gives tips on how to enjoy their productivity benefits without putting your business at risk.
Posted: 06 Jul 2015 | Published: 31 Dec 2014

Mimecast

Big Data: Moving from Hype to Confidence
sponsored by IBM
WHITE PAPER: This white paper presents survey results that reveal just how much organizations are using – or not using – big data.
Posted: 02 Jul 2015 | Published: 30 Jun 2014

IBM

NetApp AltaVault Cloud-Integrated Storage
sponsored by NetApp
WHITE PAPER: This solution brief highlights a particular type of storage that enables customers to securely back up data to any cloud at up to 90% less cost compared to on-premises solutions.
Posted: 01 Jul 2015 | Published: 18 Jun 2015

NetApp

NetApp Is Accelerating Your Data Protection Strategy to the Clouds
sponsored by NetApp
WHITE PAPER: This informative white paper makes it clear that improving data backup and recovery is a top priority for IT groups in organizations of all sizes.
Posted: 01 Jul 2015 | Published: 01 Jan 2015

NetApp

Designing the Modern Data Warehouse Environment
sponsored by IBM
WHITE PAPER: To trust your data, you must be informed about data governance. This white paper provides a stepping stone to ensuring the consistency, cleanliness, correctness, and security of your data. Access now to learn governance best practices.
Posted: 01 Jul 2015 | Published: 31 Dec 2014

IBM

Data Encryption Demystified: Seven Common Misconceptions and the Solutions that Dispel Them
sponsored by WinMagic
WHITE PAPER: This white paper presents the top 7 myths and misconceptions about encryption and how new approaches dispel them. Access this helpful resource now to get caught up on today's encryption technology and learn why it should be a part of your modern cybersecurity strategy.
Posted: 29 Jun 2015 | Published: 27 May 2015

WinMagic

A Guide to Managing Microsoft BitLocker in the Enterprise
sponsored by WinMagic
WHITE PAPER: This white paper explores how to ensure comprehensive FDE on all platforms and devices.
Posted: 29 Jun 2015 | Published: 10 Apr 2014

WinMagic

Moving to the Cloud? Then It’s Time to Consider Software-Defined Storage
sponsored by IBM
WHITE PAPER: This white paper explains why software-defined storage (SDS) provides a flexible, as well as efficient, architectural approach to the cloud, along with lower costs through highly virtualized infrastructure, simplified management and use of commodity hardware.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

IBM

Five Pillars of Transparent Data Security
sponsored by WinMagic
WHITE PAPER: This white paper outlines the 5 essential pillars of transparent data security to remove workflow and performance burdens.
Posted: 26 Jun 2015 | Published: 19 Dec 2012

WinMagic

What Consumers Believe About Cloud File Sharing & Why That’s a Warning to IT Pros
sponsored by WinMagic
WHITE PAPER: This white paper explores the pros and cons of three file sync and share security strategies. Continue reading to learn the 3 crucial aspects for securing files destined for the cloud and how to appropriately evaluate the risks of cloud file sync and share approaches.
Posted: 26 Jun 2015 | Published: 20 Apr 2015

WinMagic

The Truth About Data-At-Rest Encryption & the Cloud
sponsored by FireHost Inc.
WHITE PAPER: This white paper explains why some methods of encryption are weaker than others and suggests ways to implement the strongest encryption standards for your data-at-rest.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

FireHost Inc.

All-Flash Arrays for Big Data Workloads
sponsored by IBM
WHITE PAPER: This white paper reveals why all-flash storage for big data is a practical option for storing your data.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

IBM

Case Study: Enhancing a Leading Bank's File Monitoring
sponsored by Varonis
WHITE PAPER: This case study describes how a leading bank is able to monitor every bit of its data, down to the last file touch.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Varonis

Insider Threats: The Unexpected Risk
sponsored by Varonis
WHITE PAPER: This white paper reveals just how prevalent insider threats are and gives you advice on stopping them.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Varonis

Inside Big Data for Finance
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper outlines the best strategies for utilizing big data in the financial sector.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

Dell, Inc. and Intel®

Get Control of Cloud Based File Synchronization Services
sponsored by Varonis
WHITE PAPER: In this white paper, discover how you can allow your employees to use file synchronization without putting your data at risk.
Posted: 25 Jun 2015 | Published: 31 Dec 2014

Varonis

Understanding Data Protection Regulations in the US
sponsored by Varonis
WHITE PAPER: This white paper outlines several important security regulations in the United States and gives advice on successfully meeting all of them.
Posted: 25 Jun 2015 | Published: 31 Dec 2014

Varonis

Top Five Things to Look for in Software-Defined Storage
sponsored by IBM
WHITE PAPER: This informative white paper reveals the top 5 things to look for in an SDS solution and SDS provider.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

IBM

Five Things You Must Know About Microsoft BitLocker
sponsored by WinMagic
WHITE PAPER: This white paper presents a 5 step strategy to resolve all BitLocker security issues.
Posted: 25 Jun 2015 | Published: 17 Jun 2015

WinMagic

Ignore Compliance, Focus on Security
sponsored by FireHost Inc.
WHITE PAPER: This white paper explores how enterprises that focus on security first to address an organization's sensitive data will solve compliance requirements along the way. Instead of following a compliance checklist, learn to tackle the 5 risk assessment methodologies to mitigate threats and ensure confidentiality.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

FireHost Inc.

NetApp AltaVault Cloud-Integrated Storage
sponsored by NetApp
WHITE PAPER: This solution brief highlights a particular type of storage that enables customers to securely back up data to any cloud at up to 90% less cost compared to on-premises solutions.
Posted: 25 Jun 2015 | Published: 18 Jun 2015

NetApp

Medical Record Privacy: Why Patients are Losing Trust
sponsored by FireHost Inc.
WHITE PAPER: This white paper explores the guidelines healthcare IT organizations must follow to let patients know their privacy is valued as highly as their health.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

FireHost Inc.

Into the Breach: Lessons from Real Security Incidents
sponsored by Varonis
WHITE PAPER: This white paper outlines three devastating security breaches from start to finish, helping you to learn from the mistakes of these compromised businesses and to better keep yourself safe.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Varonis
26 - 50 of 1266 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement