IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
1 - 25 of 2549 Matches Previous Page  |  Next Page
The 12 Critical Questions you Need to Ask when Choosing an AD Bridge Solution
sponsored by One Identity
WHITE PAPER: Most enterprises today have heterogeneous IT environments, with Microsoft Active Directory (AD) providing Windows access for most users. Read this white paper to identify a number of key questions to ask when evaluating which AD bridge solution is right for you.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

One Identity

When Cryptors Attack: Timeline of a Ransomware Infection
sponsored by Kaspersky Lab
WHITE PAPER: The average amount of damage to SMBs caused by one cryptomalware attack is $99,000, according to a survey from Kaspersky Lab and B2B International. Take a closer look at this white paper to learn about cryptomalware attacks and how to prevent your company from being targeted with cryptomalware.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Kaspersky Lab

Report: Lack of SSL Traffic Inspection Poses Threat to Enterprises
sponsored by A10 Networks
EGUIDE: Most companies fall short when it comes to SSL traffic inspection, according to Ponemon Institute. Read this e-guide to reveal an expert report that recognizes how lack of SSL traffic inspection is putting companies at risk.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

A10 Networks

Expert Perspectives on Data Protection and GDPR Compliance
sponsored by CyberArk Software, Inc
EGUIDE: A report from World Economic Forum and McKinsey & Company estimates that cyberattacks could cost the global economy $3 trillion by 2020. Read this e-guide to reveal experts' perspectives on data protection, cybersecurity, and compliance.
Posted: 22 Sep 2017 | Published: 20 Sep 2017

CyberArk Software, Inc

SWIFT Security Controls to be Mandatory by 2018
sponsored by CyberArk Software, Inc
EGUIDE: Take a look at this e-guide to uncover experts' perspectives about the SWIFT security control mandate with inspections and enforcement beginning January 1, 2018.
Posted: 22 Sep 2017 | Published: 19 Sep 2017

CyberArk Software, Inc

Securely Managing your UNIX Environment
sponsored by One Identity
WHITE PAPER: Take a look at this white paper to uncover how IAM challenges within UNIX can be overcome with the right practices and tools.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

One Identity

Creating Trust as Mobile Banking Fraud Escalates
sponsored by HID
EBRIEF: Take a closer look at this white paper to uncover security risks mobile bankers are facing and what banks can do to create trust in mobile transactions
Posted: 21 Sep 2017 | Published: 21 Sep 2017

HID

Business Perception of IT Security: In the Face of an Inevitable Compromise
sponsored by Kaspersky Lab
WHITE PAPER: Companies unanimously state that cyber threats are highly damaging and that cybersecurity is one of the top requirements for business to stay afloat. Take an in-depth look at this security risk report to reveal where enterprises are seeing the most security attacks.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

Kaspersky Lab

ActivID Authentication Appliance for Enterprise
sponsored by HID
WHITE PAPER: While it's a necessity to provide employees, contractors, partners, and customers anytime, anywhere access to appropriate resources, it's also imperative that enterprises are able to maintain their security. Take a look at this white paper to reveal an authentication platform that can help you deliver access to the right users at the right time.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

HID

2017 Midyear Security Roundup: The Cost of Compromise
sponsored by TrendMicro
WHITE PAPER: In the first half of 2017 there have been 83 million total ransomware threats detected, and an average of 28 new families detected. Read this white paper to reveal ransomware attack costs and reviews of threat landscapes, so that enterprises can move forward to protect themselves against WannaCry, Petya and more.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

TrendMicro

Using Trend Micro's Hybrid Cloud Security Solution To Meet PCI DSS 3.2 Compliance
sponsored by TrendMicro
WHITE PAPER: After June 30, 2018, all entities must stop use of SSL/early TLS as a security control and use only secure versions of the protocol. Take an in-depth look at this white paper to uncover what you need to know in order to comply with PCI DDS 3.2.
Posted: 21 Sep 2017 | Published: 31 Aug 2017

TrendMicro

Agile Development to Transform Your Application Testing Program
sponsored by IBM
WEBCAST: Watch this webinar to reveal how Cisco has transformed their application testing program to make their testing secure by using IBM's technology platform.
Posted: 21 Sep 2017 | Premiered: May 18, 2017

IBM

The Journey to Value: Preparing Your Data for the GDPR
sponsored by IBM
WHITE PAPER: A new standard will be set once the General Data Protection Regulation (GDPR) is enforced beginning in May 2018. How well-prepared is your organization to comply? Learn 4 key steps to create a sustainable, governed data asset for the GDPR – and beyond.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

IBM

SIEM Analysis for Security Professionals
sponsored by LogRhythm, Inc.
EDITORIAL RESOURCE GUIDE: This expert e-guide explores why it's important that SIEM systems have an analysis interface for security professionals, as well as how advanced security analytics can safeguard your enterprise.
Posted: 20 Sep 2017 | Published: 14 Sep 2017

LogRhythm, Inc.

Managing Access to Keep Privileged Users' Credentials Secure
sponsored by SearchSecurity.com
EBOOK: Fighting creep through privileged user management is an essential but too often overlooked security practice. Take an in-depth look at this handbook to uncover problems that explain why the fight against privilege creep should be at the top of your security team's to-do list.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

SearchSecurity.com

The Life-Changing Magic of Information Governance
sponsored by Box
WHITE PAPER: Learn how to create effective information governance with 3 keys to manage even cloud-based content soundly and securely throughout its entire lifecycle.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

Box

As a DevOps Engineer, What Should I know about Security Tools?
sponsored by CyberArk Software, Inc
WEBCAST: Watch this webcast to uncover what you should know about security tools and protection in order to properly secure your DevOps.
Posted: 20 Sep 2017 | Premiered: Sep 20, 2017

CyberArk Software, Inc

Defender Lifecycle Model
sponsored by Gigamon
RESOURCE: In this short solution brief, learn how the Defender Lifecycle Model can help network viability to automate and accelerate the identification of threats.
Posted: 19 Sep 2017 | Published: 31 Aug 2017

Gigamon

IT Security and the Devops Environment
sponsored by CyberArk Software, Inc
WEBCAST: DevOps environments are unique because of the speed and scale at which they work. Watch this webcast to reveal characteristics regarding DevOps environments as well as the security aspects of DevOps.
Posted: 19 Sep 2017 | Premiered: Sep 19, 2017

CyberArk Software, Inc

How to Think like a Hacker to Stop Application Security Threats
sponsored by IBM
EGUIDE: Find out how applying the hacker mindset when setting application security standards can help uncover flaws that vulnerability scanners might not recognize.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

GDPR Primer for the C-Suite and Board of Directors
sponsored by CyberArk Software, Inc
WHITE PAPER: Take a closer look at this white paper to reveal what executives and board members need to know to prepare for the GDPR.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

CyberArk Software, Inc

Achieving a Unified Data Governance Strategy
sponsored by IBM
WHITE PAPER: Learn about recent updates to data governance and its key drivers, such as compliance, self-service analytics, big data, and data monetization.
Posted: 19 Sep 2017 | Published: 31 Jul 2017

IBM

A 5 Minute Guide to Cognitive Search for Customer Support
sponsored by Attivio, Inc.
WHITE PAPER: Explore the basics of a cognitive search platform – from natural language processing to robust security and big data analytics – and find out how cognitive search apps can help contact centers revitalize customer interactions and self-service.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

Attivio, Inc.

Forensic State Analysis: A New Approach to Threat Hunting
sponsored by Infocyte
WEBCAST: Watch this SANS Institute webcast to uncover strategies to reduce the dwell time of attackers and improve your threat hunting techniques.
Posted: 18 Sep 2017 | Premiered: Apr 3, 2017

Infocyte

Automate Log Management to Meet NIST 800-53 Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST 800-53 requirements. Explore how a log management and analysis platform can help your company meet or exceed these guidelines.
Posted: 15 Sep 2017 | Published: 31 Dec 2014

LogRhythm, Inc.
1 - 25 of 2549 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement