IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
26 - 50 of 1371 Matches Previous Page  |  Next Page
Controlling and Managing Privileged Access
sponsored by One Identity
WHITE PAPER: According to a Black Hat Report, 32% of hackers say accessing privileged accounts is the easiest and fastest way to get at sensitive data. This white paper explores the risks associated with privileged accounts and offers strategic risk mitigation tactics you can take to ensure security.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

One Identity

Equifax Breach: Lessons Learned for Your Organization
sponsored by Digital Shadows
WHITE PAPER: The Equifax data breach potentially affected 143 million individuals in the US, Canada and the UK. Inside, gain insight into the impacts of the Equifax Breach, 6 lessons learned from the breach, and how your enterprise can mitigate the risks of falling victim to such a devastating data breach.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

Digital Shadows

Need More Oomph from Oracle
sponsored by Oracle & Explorer
WHITE PAPER: Find out how to control Oracle costs better while improving database performance by learning how to conduct an Oracle Architecture Review.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

Oracle & Explorer

BitLocker - A Strong First Step in Data Security
sponsored by WinMagic
WHITE PAPER: According to Crowd Research Partners' BYOD and Mobile Security Spotlight Report, 43% of respondents say device encryption is currently a part of their mobile device management policy. Learn how you can manage BitLocker from a single security window to protect data residing across desktops, mobile devices, and more.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

WinMagic

Securing Business Information with Box
sponsored by Box
WHITE PAPER: Discover how to centralize control over content and collaboration in a way that facilitates productivity without sacrificing security and learn about Box's content management platform.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

Box

BitLocker Security Enhanced
sponsored by WinMagic
WHITE PAPER: Most enterprises don't operate on only one security platform, so why rely solely on one native encryption posture to manage your risks? Explore this solutions brief to see if the implementation of SecureDoc combined with your existent Microsoft BitLocker is right for your enterprise's security needs.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

WinMagic

CloudVM
sponsored by WinMagic
WHITE PAPER: Don't defer the responsibility of protecting your enterprise – take responsibility for protecting your data and workloads in the cloud. Take a look at this technology overview to see if SecureDoc CloudVM is the right approach for your enterprise's cloud data protection and encryption needs.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

WinMagic

6 GDPR Compliance Pitfalls & How to Avoid Them
sponsored by Collibra
WHITE PAPER: The GDPR is a complex regulation. And on the path to compliance, there will be unanticipated roadblocks. The good news is, you can find your way through them.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

Collibra

Managing BitLocker in the Enterprise with SecureDoc
sponsored by WinMagic
WHITE PAPER: Microsoft offers built-in encryption software known as BitLocker, and it is designed to protect data. But how do you simplify BitLocker management? Explore this technology brief to discover if the combination of SecureDoc and BitLocker is right for your encryption and data protection needs.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

WinMagic

Balancing Security and Flexibility for Collaboration
sponsored by Box
WHITE PAPER: Explore the most pressing challenges facing secure collaboration as well as the top reasons employees turn to consumer tools in the workplace. Learn how to enable truly secure, centralized collaboration in the cloud that restores IT's control and delivers positive user experiences for employees.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

Box

GDPR
sponsored by RSA
WHITE PAPER: GDPR is on track to be the most significant change in global privacy laws in the past 20 years. Everyone wants to know: How will this affect my business? Read this RSA e-book to discover what you need to know about how the GDPR and EU's privacy rules could impact your business operations.
Posted: 08 Nov 2017 | Published: 31 Dec 2016

RSA

Data Protection on HCI Platforms
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Data protection is critical for disaster recovery and business continuity, and is one of the key evaluation markers for organizations purchasing IT infrastructure. This paper discusses HCI's impact on data protection, key factors to consider, data protection best practices and recommendations on when and how to use them for various use cases.
Posted: 07 Nov 2017 | Published: 30 Jun 2017

Hewlett Packard Enterprise

Using Hyperconverged Infrastructure to Improve Data Protection and Recovery Effectiveness
sponsored by Hewlett Packard Enterprise
WHITE PAPER: IT organizations need to take a fresh look at their approach to data protection and availability, and move beyond the limitations of client/server era technologies. Access this IDC white paper to learn how hyperconverged infrastructure simplifies and improves data protection and recovery effectiveness.
Posted: 07 Nov 2017 | Published: 31 May 2017

Hewlett Packard Enterprise

GDPR Survival Basics
sponsored by RSA
WHITE PAPER: GDPR takes effect in May 2018. How prepared is your organization? This white paper sets out 5 basic steps for organizations to consider when setting up framework for managing GDPR risk.
Posted: 07 Nov 2017 | Published: 07 Nov 2017

RSA

A Practical Guide for GDPR Compliance
sponsored by RSA
WHITE PAPER: According to an Osterman Research report, 64% of organizations are not ready to comply with the GDPR. Grab your copy of this Osterman Research practical guide to understanding your readiness. Don't miss the checklist on page 9.
Posted: 06 Nov 2017 | Published: 06 Nov 2017

RSA

GDPR: What it Means to Your Cybersecurity Strategy
sponsored by RSA
WHITE PAPER: More than 90% of Europeans say they want the same data protection rights regardless of where their data is processed, and as a result the EU GDPR came along. This white paper reveals what the GDPR means for your various cybersecurity strategies and how you'll need to adjust your approaches to comply.
Posted: 06 Nov 2017 | Published: 06 Nov 2017

RSA

How to Secure Your Data and Protect Your Bottom Line
sponsored by IBM
WHITE PAPER: New technology trends, including cloud, mobile and big data, create opportunities for your enterprise to exploit analytic insights. But the same things that enable these opportunities can skyrocket your risks if proper data security and governance controls aren't in place. Learn how you can protect your data to avoid risk.
Posted: 03 Nov 2017 | Published: 03 Nov 2017

IBM

How to Shift Your Analytics Strategy to Keep Up with Industry Change
sponsored by Looker
WHITE PAPER: Actionable BI is critical for all organizations – but many lack the ability to analyze data quickly, comprehensively and effectively. Looking at healthcare, learn how embedded analytics tools that deliver self-service reporting capabilities can reduce barriers to success.
Posted: 02 Nov 2017 | Published: 02 Nov 2017

Looker

Introduction to Artificial Intelligence for Security Professionals
sponsored by Cylance
WHITE PAPER: According to Gartner, by 2018, 25% of security products used for detection will have some form of machine learning built into them. Explore this 155 page e-book to learn more about artificial intelligence and machine learning for security professionals.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

Cylance

10 Traits Of Successful DLP Programs
sponsored by InteliSecure
WHITE PAPER: According to Gartner, by 2018, 90% of organizations will implement at least one form of integrated DLP. This white paper reveals 10 traits of successful DLP programs to increase the effectiveness of your program.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

InteliSecure

The Journey to Creating Value from the GDPR
sponsored by IBM
WHITE PAPER: Learn about the key steps on the journey to creating value from the GDPR with a strategy for building sustainable, governed data flows.
Posted: 31 Oct 2017 | Published: 31 Mar 2017

IBM

Operationalize Your Organization for the GDPR
sponsored by InteliSecure
WHITE PAPER: Learn how creating a general data protection regulation framework to protect critical assets, both tangible and intangible (think IP), will enable you to operationalize your GDPR compliance.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

InteliSecure

5 Key Analytics and Machine Learning Takeaways
sponsored by Splunk
WHITE PAPER: Explore the top 5 analytics takeaways from Splunk's .conf2017 about everything from predictive analytics and machine data to threat intelligence.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

Splunk

Pathways for GDPR Readiness
sponsored by IBM
WHITE PAPER: The GDPR regulation can be used as a potential business opportunity for your company. Explore this white paper to learn more about getting a leg up with the GDPR journey, potential drawbacks of failing to comply with GDPR and how your company can benefit from GDPR.
Posted: 30 Oct 2017 | Published: 30 Oct 2017

IBM

Achieving A Unified Data Governance Strategy
sponsored by IBM
WHITE PAPER: Learn how you can achieve a unified data governance strategy and delve into topics like the evolution of data governance, the impact of compliance on data, analytic insights and data monetization, and more.
Posted: 30 Oct 2017 | Published: 31 Jul 2017

IBM
26 - 50 of 1371 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement