IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
76 - 100 of 1320 Matches Previous Page  |  Next Page
GDPR Compliance: The Implications for Test Data Management
sponsored by CA Technologies.
WHITE PAPER: Learn about the key implications of GDPR regulations for test data management and explore topics like data masking, synthetic data generation, and more.
Posted: 11 Sep 2017 | Published: 31 Dec 2016

CA Technologies.

Trust Must Be the Foundation of Your B2B Digital Ecosystem
sponsored by IBM
WHITE PAPER: Successful management of your digital business and ecosystems is not founded on technology, but trust. This 19 page Forrester report explores the fundamental role that trust plays in your digital transformation, focusing on the role of trust in the business-to-business context.
Posted: 11 Sep 2017 | Published: 29 Mar 2017

IBM

GDPR Compliance: How Can You Adapt to the New Regulation?
sponsored by CA Technologies.
WHITE PAPER: The General Data Protection Regulation (GDPR) is set to begin in May 2018 – is your organization ready to comply? Learn from a technology perspective what's needed to comply with the GDPR. Topics covered include data breach reporting, accountability, rights and more.
Posted: 08 Sep 2017 | Published: 08 Sep 2017

CA Technologies.

Enterprise-class Big Data for Data Analytics
sponsored by Virtustream
WHITE PAPER: Big data has been a big mystery for a long time, but the fog is starting to lift. In this white paper, you will find everything you need to use the cloud to leverage big data.
Posted: 08 Sep 2017 | Published: 08 Sep 2017

Virtustream

Anatomy of a Cyberattack
sponsored by Infocyte
WHITE PAPER: According to Ponemon, the cost of a data breach is significantly less if you contain it within 30 days. Check out this white paper to uncover the anatomy of cyberattacks to see where different "hunt tools" can be used for your protection to detect data breaches early.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Infocyte

Reducing Attacker Dwell Time
sponsored by Infocyte
WHITE PAPER: Discover how to reduce attacker dwell time with a threat hunting strategy that enables you to detect and resolve breaches to your network faster.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Infocyte

Your Employee Security Checklist: 10 Tips
sponsored by Kaspersky Lab
WHITE PAPER: Careless employees were the single biggest cause of serious incidents involving data loss or leakage— involved in 1 in 5 serious data breaches. Find 10 tips for employee security to prevent serious incidents at the employee level.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Kaspersky Lab

Data Protection: Secure Apps and Data Wherever They Are
sponsored by Veeam Software
WHITE PAPER: If you're beginning to consider upgrading to an availability solution designed to protect apps and data wherever they are — on-premises or in the cloud, on laptops or desktops, virtual machines or physical servers — then this backup/data protection resource was written with you in mind.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Veeam Software

A Guide to Improving Availability and Data Protection in the Hybrid Cloud
sponsored by Veeam Software
WHITE PAPER: The hybrid cloud enables organizations to reduce costs and increase agility – however, you must ensure you are making the shift to the cloud safely, securely, and strategically. Learn how to do so in this white paper.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Veeam Software

7 Steps to Achieve Database Security in the Cloud
sponsored by Trustwave
WHITE PAPER: As organizations increasingly move databases to the cloud to take advantage of the cost savings and flexibility, it's more important than ever to factor in security. Learn 7 steps to cost effective database security in the cloud.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Trustwave

Protecting Patient Data & Complying with HIPAA Security Regulations
sponsored by Trustwave
WHITE PAPER: Data protection is essential – particularly in the health industry. The Health Insurance Portability and Accountability Act (HIPAA) was enacted to protect Personal Health Information (PHI) of patients. Learn how to comply with HIPAA security regulations.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Trustwave

How to Move Data Protection to the Cloud
sponsored by Druva Software
WHITE PAPER: Read this resource to discover 5 considerations for moving your virtual systems data protection to the cloud, including improved business agility, simplified management, and more.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Druva Software

6 Reasons to Choose the Dell EMC Data Protection Suite Family
sponsored by Dell EMC and Intel®
WHITE PAPER: Access this resource to discover 6 essential features every data protection suite must have. Whether on-premises or in the cloud, see how one suite centralizes monitoring, analysis, and reporting, as well as enables global management of data copies across primary and protection storage.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

Dell EMC and Intel®

Why In-cloud Data Protection Architecture Matters to a Modern IT Infrastructure
sponsored by Dell EMC and Intel®
WHITE PAPER: ESG evaluates in-cloud data protection in this white paper, which will centralize, automate, and accelerate backup and recovery in your organization. Access now to see, in this vein, an economic analysis of Dell EMC Protection Software, with the storage and compute efficiency of their data protection-optimized cloud storage appliance highlighted.
Posted: 29 Aug 2017 | Published: 30 Jun 2017

Dell EMC and Intel®

Top Areas to Look for in Data Protection Tools
sponsored by Dell EMC and Intel®
WHITE PAPER: We are entering an era where data is your most valuable asset. You need a data protection tool to ensure that your data stays yours. This white paper gives you 8 key focus areas to evaluate when making your data protection decision.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

Dell EMC and Intel®

As Learning Hinges On Devices And Applications, Challenges Increase For IT
sponsored by IBM
WHITE PAPER: Explore the importance of putting security measures in place to restrict apps, documents and data to specific users and groups, ensuring sensitive data does not end up in the wrong hands. Learn from the education industry on how endpoint management can help you achieve stronger data security.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

IBM

How Stronger Governance Enables Distributed BI
sponsored by Qlik
WHITE PAPER: Find out how to overcome challenges like lingering data silos, data security, and establishing a single source of truth. Learn how a strong governance program and a distributed BI model can optimize BI and analytics.
Posted: 25 Aug 2017 | Published: 31 Dec 2016

Qlik

Eliminating Access Blind Spots
sponsored by RSA
WHITE PAPER: 63% of data breaches involve compromised identities, according to the 2017 Verizon DBIR. Uncover how to enhance your security posture with multi-factor authentication that can mitigate potential risks prior to them causing trouble.
Posted: 24 Aug 2017 | Published: 24 Aug 2017

RSA

6 Key Steps to Successful Identity Assurance
sponsored by RSA
WHITE PAPER: Uncover guidance on the six key elements to identity assurance and how to increase security while optimizing the end user's experience. Learn how to deliver access to users that's both convenient and secure.
Posted: 24 Aug 2017 | Published: 24 Aug 2017

RSA

Recovering your Company's PCs Affected by Ransomware
sponsored by Acronis
WHITE PAPER: After a ransomware strike on a PC, your company data is at a serious risk. Read this white paper to learn how to safely protect your company's PCs after a ransomware strike.
Posted: 17 Aug 2017 | Published: 31 Dec 2016

Acronis

Discover a Database and Big Data Scanner
sponsored by Trustwave
WHITE PAPER: This white paper explores the capabilities of a database scanner that allows you to immediately discover, assess, and report on the security, risk, or compliance posture of any database or big data store within your environment (on premise or in the cloud) in minutes.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Trustwave

Are You Sure You Didn't Authorize Someone You Shouldn't Have?
sponsored by HID Global
WHITE PAPER: Explore lessons learned from the Google Docs phishing scam. Learn the role multi-factor authentication plays in protecting organizations from phishing attacks and other cyber threats.
Posted: 14 Aug 2017 | Published: 15 Jun 2017

HID Global

Cloud Security: 2017 Spotlight Report
sponsored by Quest
WHITE PAPER: Access this e-book to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Quest

Achieving GDPR Compliance with Data Governance
sponsored by Infogix
WHITE PAPER: Discover how to meet GDPR compliance requirements with an organization-wide data governance program that relies on collaboration, shared accountability, machine learning analytics, and enhanced data visualizations.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Infogix

Data Protection Done Right
sponsored by AWS- Dell EMC
WHITE PAPER: Dell EMC Data Protection Suite offers an integrated, cloud-optimized solution to help protect your data and meet your SLAs, both on-premises and on AWS.
Posted: 24 Aug 2017 | Published: 31 Jul 2017

AWS- Dell EMC
76 - 100 of 1320 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement