IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
51 - 75 of 1371 Matches Previous Page  |  Next Page
Vendor Landscape: Vulnerability Management, 2017
sponsored by Tenable, Inc.
WHITE PAPER: According to a Forrester security survey, software vulnerabilities are the leading method of external intrusion in a breach. Explore this Forrester report to learn more about the vulnerability management vendor landscape and security trends that directly affect and enable business operations.
Posted: 30 Oct 2017 | Published: 30 Oct 2017

Tenable, Inc.

5 Steps to Building a Successful Vulnerability Management Program
sponsored by Tenable, Inc.
WHITE PAPER: Vulnerability management is something that will never end and will need to be improved and worked on periodically to ensure the security of your enterprise.Explore this white paper to learn more about successful vulnerability management programs to protect your enterprise.
Posted: 30 Oct 2017 | Published: 27 Apr 2017

Tenable, Inc.

Multi-factor Authentication for dummies
sponsored by iovation, Inc.
WHITE PAPER: The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

iovation, Inc.

13 Essential Steps to Meeting the Security Challenges
sponsored by Tenable, Inc.
WHITE PAPER: While multinational companies can likely meet some of the GDPR requirements right now, most will find that they have a lot of work to do in order to meet full compliance. Key into this white paper to gain a deeper understanding of GDPR and why the regulation is important to IT professionals.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Tenable, Inc.

Find and eliminate security blind spots with always-on vulnerability management
sponsored by Tenable, Inc.
WHITE PAPER: Explore this Frost & Sullivan white paper to learn more about vulnerability management: implementation, endpoints, user behavior, and more. Inside, also discover why one vulnerability management vendor received Frost & Sullivan's 2017 Visionary Innovation Leadership Award.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Tenable, Inc.

6 Key Use Cases for Securing Your Organization’s Cloud Workloads
sponsored by CyberArk Software, Inc
WHITE PAPER: According to CyberArk Software, total worldwide spending on cloud services will reach $266 billion by 2021 and SaaS will consume nearly 60% of cloud spending by then. Explore this white paper to gain insight into how you can ensure your cloud workloads and infrastructures are secure.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

CyberArk Software, Inc

A Privileged Account Security Approach To GDPR Readiness
sponsored by CyberArk Software, Inc
WHITE PAPER: It is difficult to achieve GDPR compliance without securing the privileged pathways to the systems containing personal data. Key into this white paper to learn more about GDPR and how you can protect personal data within your organization.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

CyberArk Software, Inc

At-Risk Data in the Cloud: 3 Strategies to Stop the Data Bleed
sponsored by Absolute
WHITE PAPER: Gartner estimates that by 2019, cloud security audits will routinely include a model that scores risk and implementation effectiveness separately. Explore this white paper to learn how you can effectively mitigate the risks threatening your enterprise's data in the cloud.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

Absolute

The Race to Readiness
sponsored by Citrix
WHITE PAPER: According to a study conducted by Verizon, 63% of security breaches involve weak or stolen credentials. This white paper offers 4 steps and explanations to getting a head start on GDPR data security to help your enterprise protect against breaches.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Citrix

A Secure, IT-Approved File Sharing Alternative to Shadow IT
sponsored by Citrix
WHITE PAPER: Discover how to mitigate the security risks and Shadow IT issues associated with online file sharing services. Find out how to protect your data while still enabling employees to be productive, and uncover 5 ways to identify and eliminate Shadow IT that results from unauthorized file sharing accounts.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Citrix

7 Requirements for an Effective EFSS Platform
sponsored by Citrix
WHITE PAPER: Discover how to make sure you enterprise file sync and sharing (EFSS) offers the flexibility that users need without sacrificing security. Learn how to mitigate the risks associated with personal file-sharing services and uncover 7 key requirements for a sound EFSS platform.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

Citrix

New Cybersecurity Regulations Adopted to Protect Financial Systems & Information
sponsored by HID Global
WHITE PAPER: According to the Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Explore this white paper to discover how to protect your organization from data breaches.
Posted: 23 Oct 2017 | Published: 13 Oct 2017

HID Global

Meet the GDPR Regulation
sponsored by Citrix
WHITE PAPER: According to a Ponemon Institute study, while 67% of respondents are aware of GDPR, only 50% of the organizations have allocated budget and started to prepare for these new regulations. This white paper offers an overview of the GDPR, why it matters, and what organizations like you need to do to prepare and comply with it.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

Citrix

A Risk Manager’s Guide to the General Data Protection Regulation (GDPR)
sponsored by BitSight
WHITE PAPER: Noncompliance with the GDPR will result in a maximum fine of €20,000,000 or 4% of an organization's worldwide revenue, whichever is greater. In this white paper, gain a deeper understanding of the GDPR, how it will affect your organization, and how you can prepare for it.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

BitSight

The 6 Phases of a DDoS Incident Response Plan
sponsored by Arbor Networks
WHITE PAPER: Incident response is too often an afterthought in the case of DDoS attacks. So, what does an effective incident response program look like? Inside uncover the 6 phases of a DDoS incident response plan and how to put them into place.
Posted: 20 Oct 2017 | Published: 20 Oct 2017

Arbor Networks

The Three Faces Of Insider Threat
sponsored by Absolute
WHITE PAPER: According to IBM, 95% of all security incidents involve human error. Are you prepared for the enemy within? In this white paper, uncover how to protect your organization against insider threats.
Posted: 20 Oct 2017 | Published: 20 Oct 2017

Absolute

Why Banks Need a Dedicated Mobile Banking Security System
sponsored by HID Global
WHITE PAPER: According to a study conducted by Ratewatch, 81% of financial institutions surveyed are currently offering mobile banking services, but 36% of consumers say they are not using it because they're worried about security risks. This white paper reveals 5 FAQs to help banking organizations make smart decisions when evaluating mobile banking security.
Posted: 20 Oct 2017 | Published: 31 Dec 2016

HID Global

Check Your Armor: What's Your Most Vulnerable Cybersecurity Spot?
sponsored by Simeio
WHITE PAPER: When a company experiences a data breach, hack or other compromise to infrastructure or assets, the company does not realize all of the risk mitigation steps that were overlooked. This white paper reveals a comprehensive identity checklist to ensure your company does not fall victim to a data breach in the first place.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

Simeio

Complying with GDPR: What All Organizations Need to Know
sponsored by Absolute
WHITE PAPER: With GDPR rapidly approaching, companies are now facing the "Big 3": tough reporting, more responsibility, and bigger fines. Explore this white paper to gain a better understanding of GDPR regulations as well as a breakdown of the new penalties, the implications of BYOD and more.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

Absolute

A Minute in the Life of Google's Security Infrastructure
sponsored by Google Cloud
WHITE PAPER: Defending the world's largest network against persistent and constantly evolving cyber threats has driven Google to architect, automate, and develop advanced tools to help keep us ahead. This report outlines how we've built and evolved our defenses so you can apply the same architectural decisions to your own business.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

Google Cloud

5 Steps to Implement & Maintain PCI DSS Compliance
sponsored by AlienVault
WHITE PAPER: Achieving and maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be difficult. Explore this white paper to uncover 5 steps to take to make the compliance process easy and secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

10 Tips to Thrive in the Subscription Economy
sponsored by Adyen
WHITE PAPER: Learn 10 tips to thrive in the subscription economy so that you can improve customer experiences and discover a payment platform designed to help you optimize growth across online, in-app, and in-store channels.
Posted: 18 Oct 2017 | Published: 18 Oct 2017


Threat Intelligence Evaluator's Guide
sponsored by AlienVault
WHITE PAPER: One of the most critical weapons that can be used in cyber defense is threat intelligence. This white paper reveals a threat intelligence guide to help you evaluate service providers, so that you can pick which is best for you in preventing, detecting, and responding to emerging threats.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

Veritas Strengthens Position in Multicloud, Hybrid IT World with Cloud Data Management and Protection Strategies
sponsored by Veritas
WHITE PAPER: This IDC Market Perspective focuses on multicloud, hybrid IT world. By adding to its collaboration with AWS, Microsoft Azure, and Red Hat OpenStack, Veritas now has a partnership with Google and IBM, and is strengthening its position to provide holistic information management capabilities and data protection in the multicloud, hybrid IT world.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Veritas

Halving Downtime Costs for Mission Critical Apps
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: Discover in this paper how deploying an application-led backup and recovery architecture will reduce data loss exposure to the sub-second level. Read on to see the key components of this architecture, including its ability to validate database blocks from end-to-end, and more.
Posted: 17 Oct 2017 | Published: 02 Aug 2017

Oracle Corporation UK Ltd
51 - 75 of 1371 Matches Previous Page    1 2 3 4 5 6    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement