IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
76 - 100 of 1307 Matches Previous Page  |  Next Page
Top 6 Security Considerations in Migrating to Microsoft Windows 10
sponsored by Absolute
WHITE PAPER: Examine 6 of the most important IT security considerations in migrating to Windows 10. Discover how persistent endpoint security tools can help you address these challenges and enable your devices to stay secure beyond the operating system upgrades.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

Absolute

Trends and Tactics: How IT Professionals are Approaching AppSec Today
sponsored by Veracode, Inc.
WHITE PAPER: Discover the strategies and tactics being implemented by IT professionals to ensure the security of their applications. Learn the obstacles they're working everyday to overcome and devise a plan of your own to mitigate your app security hardships.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Top 10 Data Security Tips to Safeguard Your Business
sponsored by Absolute
WHITE PAPER: New IT trends typically advance faster than the processes to secure them. However, as high profile data breaches hit the headlines on a daily basis, data protection regulations are catching up. Discover 10 tips on how to safeguard your business.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Absolute

At-Risk Data in the Cloud: 3 Strategies to Stop the Data Bleed
sponsored by Absolute
WHITE PAPER: Learn about each type of insider threat and discover strategies to mitigate their impact on your organization. Visibility through routine scans to discover sensitive data in cloud-sync folders can help IT move from paranoia or a false sense of security to peace of mind.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Absolute

Five Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Discover how to successfully integrate security with DevOps and learn 5 principles your security strategy must address. Furthermore, understand how DevOps and CI/CD are different from Agile development and how this difference changes the requirements for application security.
Posted: 02 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

How the Cloud Has Changed Email Archiving Forever
sponsored by Mimecast
WHITE PAPER: To solve mailbox bloat, CIOs are turning to email archiving solutions—but on-premises archiving is now too difficult to manage. Discover how cloud is changing email archiving, and overcome the capacity shortcomings associated with traditional systems with self-service recoverability, and more.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Mimecast

5 Essentials for Achieving Cloud Archiving Success
sponsored by Mimecast
WHITE PAPER: Learn five essentials for achieving cloud archiving success, including guidance on how to avoid common misconceptions about cloud email archiving, and how to prepare for e-discovery and litigation with a secure storage solution.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

Mimecast

Enable Data Protection in the Cloud
sponsored by Commvault
WHITE PAPER: Discover a holistic platform that addresses data management and protection needs, spanning from your data center to your multi-cloud environment. Learn how to orchestrate complex end-to-end processes with custom workflow automation engines that let you set it and forget it.
Posted: 12 Oct 2016 | Published: 30 Sep 2016

Commvault

Top 4 Reasons to Adopt Data Lifecycle Management
sponsored by Iron Mountain
WHITE PAPER: This white paper examines the top 4 reasons why you must focus on deploying data lifecycle management as a strategic initiative. It also explores where and how to use specific solutions, along with the benefits of working with a partner that can offer a comprehensive approach to data lifecycle management.
Posted: 05 Oct 2016 | Published: 31 Aug 2016

Iron Mountain

Building a Data Lifecycle Management Strategy in the Era of Digital Transformation
sponsored by Iron Mountain
WHITE PAPER: Discover how to formulate and execute a data lifecycle management plan that accelerates digital transformation and enable you to meet and e-discovery requirements, improve availability, and secure data stored and archived in the cloud. Download now to fill in the gaps of your data storage strategy.
Posted: 04 Oct 2016 | Published: 04 Oct 2016

Iron Mountain

Frequently Asked Questions About Data Lifecycle Management
sponsored by Iron Mountain
WHITE PAPER: Digital data is growing dramatically in volume and importance. This means you need a sound data lifecycle management strategy. This white paper provides expert answers to the most frequently asked questions about data lifecycle management to help you construct a rock-solid strategy.
Posted: 03 Oct 2016 | Published: 31 Aug 2016

Iron Mountain

Veritas NetBackup Appliances: Reducing Cost and Complexity
sponsored by Veritas
WHITE PAPER: This brief white paper highlights a fully integrated appliance for backup and recovery with highly scalable storage appliances that lowers costs and simplifies operations. Discover 7 ways in which appliances can enhance your backup infrastructure.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Veritas

Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

The Modern Cybercriminal's Attempt to Stay Undetected
sponsored by Dell SecureWorks
WHITE PAPER: This short infographic gives you an in-depth look at the timeline of the average data breach from penetration to detection. Learn the game plan of a cybercriminal looking to steal your data and prepare a defensive scheme of your own to stop hackers in any phase of the breach lifecycle.
Posted: 09 Sep 2016 | Published: 01 Aug 2016

Dell SecureWorks

Four Top Cybercrime Trends
sponsored by IBM
WHITE PAPER: Today, organizations are going back to the basics. The major cybersecurity trends of recent can largely be addressed by focusing on "security 101." Learn how to reduce enterprise risk and limit attackers' opportunities as much as possible.
Posted: 02 Nov 2016 | Published: 31 Dec 2015

IBM

Reviewing a Year of Serious Data Breaches, Major Attacks and New Vulnerabilities
sponsored by IBM
WHITE PAPER: Discover which industries were hit hardest in 2015 and what these attacks mean for the future. Learn what steps you can take to prepare your security plan for growing threats in 2016 and beyond.
Posted: 02 Nov 2016 | Published: 01 Apr 2016

IBM

Top 5 Pitfalls to Avoid in Your Data Protection Strategy
sponsored by HDS and Veritas
WHITE PAPER: Discover five critical pitfalls to avoid when building a successful data protection strategy for your organization. Learn how to best navigate the various data protection solutions from digital to physical and private to public clouds while ensuring enterprise scalability.
Posted: 14 Oct 2016 | Published: 30 Sep 2016

HDS and Veritas

8 Tips to Stay Ahead of the Top 2016 Data Protection Trends
sponsored by HDS and Veritas
WHITE PAPER: Data protection has never been more in the forefront, as information is the lifeblood and differentiator in a constantly changing world. Discover 8 tips to help you stay ahead of the top 2016 data protection trends, ultimately helping you innovate and create business value.
Posted: 13 Oct 2016 | Published: 30 Sep 2016

HDS and Veritas

Hitachi Data Systems and Veritas: Joint Brochure
sponsored by HDS and Veritas
WHITE PAPER: Discover how your organization can save money, save resources and reduce risk through better, more economical data management. Learn how to transform your data into valuable information and shape it into an integral, cost-effective source of business intelligence.
Posted: 11 Oct 2016 | Published: 30 Sep 2016

HDS and Veritas

No Downtime, No Problem. Silverstring Protects Customers and Their Data
sponsored by Neustar
WHITE PAPER: Discover how Silverstring protects their customers' mounds of data and keep their site up and running without the risk of downtime. With top notch performance, availability and security, Silverstring rests assured that they can meet any IT challenge they face moving forward.
Posted: 10 Oct 2016 | Published: 30 Sep 2016

Neustar

Securing Data Access Within the Healthcare Industry
sponsored by VASCO Data Security International
WHITE PAPER: Access this white paper to better understand the changing role of technology within the healthcare sector and best practices to integrate security without compromising the patient experience.
Posted: 23 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

How Strong Is Your Electronic Healthcare Records Storage Strategy?
sponsored by Kaminario
WHITE PAPER: In this brief paper, you will access a checklist for evaluating how well your healthcare data storage strategy holds up to these rising EHR data volumes. Read on to discover if your data storage delivers predictability as EHR data grows, provides resilient data protection, and more.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Kaminario

Preventing Ransomware Threats to Health Data in 10 Steps
sponsored by Cisco
WHITE PAPER: Health data has become some of the most sought-after personal data on the black market, making healthcare professionals and hospital systems prime targets for cybercrime – particularly ransomware attacks. This e-guide will provide you with 10 steps to avoid ransomware attacks on your health systems.
Posted: 16 Sep 2016 | Published: 14 Sep 2016

Cisco

Best Practices for Your Disaster Recovery/Business Continuity Plan
sponsored by McKesson Corporation
WHITE PAPER: In this expert guide, discover 10 best practice tips to ensure your disaster recovery/business continuity plan meets your enterprise's data security needs. Also learn how backup and disaster recovery, historically treated as separately, are converging to provide a more cohesive data management plan.
Posted: 13 Sep 2016 | Published: 12 Sep 2016

McKesson Corporation

2016 Cost of Data Breach Study United States
sponsored by IBM
WHITE PAPER: This Ponemon Institute Study includes data breach information over the past year from 64 organizations in 16 industry sectors located in the United States.
Posted: 01 Sep 2016 | Published: 01 Jun 2016

IBM
76 - 100 of 1307 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement