IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
1 - 25 of 2614 Matches Previous Page  |  Next Page
Compliance: Unlocking the Data that Matters
sponsored by BT
WHITE PAPER: Improving the safety and resilience of the financial markets, along with fighting financial crime, has risen to the top of companies' agendas. In this white paper, uncover compliance challenges for risk teams in the financial sector as well as ways to gain compliance while maintaining the safety of clients' information.
Posted: 22 Nov 2017 | Published: 22 Nov 2017

BT

Data + Security = A Most Unvirtuous Relationship
sponsored by Delphix
RESOURCE: Learn about the emergence of DataOps as well as how different data security methodologies and tools are changing to handle modern threats to growing volumes of data and personal information.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

Delphix

FBI Cyber Squad Guest Speaking on Emerging Cyber Threats
sponsored by Digital Shadows
WEBCAST: Do you understand your data and susceptibility to being targeted? Watch this webcast to uncover emerging cyber threats, persistent vulnerabilities and strategies for protecting your enterprise.
Posted: 21 Nov 2017 | Premiered: Nov 21, 2017

Digital Shadows

How Quantum Computing Will Change Browser Encryption
sponsored by F5 Networks
WHITE PAPER: This white paper provides insight into how quantum computing will affect the current global encryption standard, the Transport Layer Security (TLS), formerly known as SSL.
Posted: 21 Nov 2017 | Published: 13 Jul 2017

F5 Networks

Introducing the Delphix Dynamic Data Platform
sponsored by Delphix
VIDEO: In this webcast, hear from Patrick Lightbody of Delphix, about the need to rethink the approach to data management and access to data, which will require significant changes among people and processes.
Posted: 21 Nov 2017 | Premiered: 15 Nov 2017

Delphix

The Evolving Role of CISOs and their Importance to the Business
sponsored by F5 Networks
WHITE PAPER: Explore this 67 page Ponemon Institute Security Report to gain insight into the evolution and influence of CISOs through interviews with 184 companies regarding insights, challenges and approaches to security in today's global threat landscape.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

F5 Networks

A Matchmaker's Guide to UBA Solutions
sponsored by Rapid 7
WHITE PAPER: Gartner predicts that by 2020, less than 5 stand-alone user behavior analytics (UBA) solutions will remain in the market, with most vendors focusing on specific use cases and outcomes. This paper offers a list of questions to help you pick the right UBA strategy to confirm your company's protection far into the future.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

Rapid 7

ROI Analysis: IBM BigFix Patch And BigFix Compliance
sponsored by IBM
WHITE PAPER: This Forrester report examines the potential ROI enterprises may gain by deploying IBM's BigFix Patch and BigFix Compliance. Uncover the security and cost benefits users saw with this implementation through real examples and experiences.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

IBM

DDoS: Strategies for Dealing With a Growing Threat
sponsored by A10 Networks
WHITE PAPER: In 2015, 10% of average DDoS attacks were above 50 Gbps. Today the average size of attacks greater than 50 Gbps quadrupled to 42%. This IDG paper provides research on recent DDoS attacks and compares the data to a similar study conducted a few years ago to discover what measures organizations need to take now to prevent the attacks.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

A10 Networks

EU General Data Protection Regulation with MarkLogic
sponsored by MarkLogic
VIDEO: This webcast covers the importance of understanding the GDPR, and the steps to take to achieve and manage compliance, with the use of a database that integrates data better, faster, with less cost. Listen in to learn about the steps your organization should take to ensure compliance, and how you stay on top of the process along the way.
Posted: 21 Nov 2017 | Premiered: 15 Nov 2017

MarkLogic

Go From Compromise to Containment - Fast
sponsored by Rapid 7
WEBCAST: According to the Verizon Data Breach Investigations Report, stolen credentials are the number one threat vector across all data breaches. Watch this webcast to uncover how you can detect the top attack vectors behind breaches, including compromised credentials, malware, and phishing.
Posted: 20 Nov 2017 | Premiered: Nov 20, 2017

Rapid 7

Step Up Your Security and Privacy with Data Masking
sponsored by Delphix
VIDEO: With data breaches occurring regularly, organizations are forced to better protect sensitive data across the enterprise. However, doing so and staying compliant is not an easy task, especially with new mandates like GDPR and HIPAA. This webcast explores how you can use data masking to keep data protected.
Posted: 20 Nov 2017 | Premiered: 15 Nov 2017

Delphix

Managed Detection and Response Service
sponsored by Rapid 7
WEBCAST: According to the 2017 SANS Incident Response Survey, 87% responded to at least one incident in the past year. Take a look at this webcast to gain insight into improving your incident response strategy by validating and identifying known and unknown threats in order to protect your company.
Posted: 20 Nov 2017 | Premiered: Nov 7, 2017

Rapid 7

Case Study: Incident Response Time Savings and Compliance Ease
sponsored by Rapid 7
CASE STUDY: This case study explores how ESB energy company overcame its challenges of having limited IT staff resources, a growing compliance burden, and numerous threats from hackers. Uncover how ESB overcame these issues by implementing a vulnerability management approach alongside an incident detection response strategy.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Rapid 7

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity

How can organizations get control over privileged identity management?
sponsored by One Identity
EGUIDE: Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
Posted: 20 Nov 2017 | Published: 14 Nov 2017

One Identity

Achieve SIEM Solution Success
sponsored by Rapid 7
WHITE PAPER: In order to unify data, reliably detect attacks, and identify risk across your organization, a SIEM deployment is necessary. This white paper offers Gartner's 6 challenges of the main causes behind failed SIEM deployments and suggests an approach to implementing a successful SIEM platform while keeping these challenges in mind.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Rapid 7

Journey to GDPR
sponsored by IBM
WHITE PAPER: GDPR readiness is critical and a business necessity, but many organizations are struggling with the complex compliance requirements. This article provides information regarding GDPR as well as strategies to ensure you are compliant with the data processing rules.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

IBM

Damage Control: The Impact of Critical IT Incidents
sponsored by Splunk
WHITE PAPER: IT incidents result in annual costs running into millions of dollars, while the average organization is dealing with hundreds of incidents every week. This Quocirca research report analyzes the impact critical IT incidents have on organizations, which halt business processes and impact users.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Splunk

Get Ahead of GDPR Demands
sponsored by IBM
WHITE PAPER: The GDPR financial penalties for non-compliance are daunting; learn how to gain GDPR compliance by keeping your company's data secure. This article provides insight into preparing for the GDPR by accelerating compliance readiness and managing data breaches.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

IBM

Case Study: Buyer's Remorse No More
sponsored by Rapid 7
WHITE PAPER: Explore this case study to discover how a finance company, after being hacked, was able to secure incredibly sensitive client information by implementing a testing framework alongside a vulnerability management platform.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Rapid 7

The Clock is Ticking on GDPR Obligations
sponsored by IBM
WHITE PAPER: GDPR gives organizations 72 hours to report a data breach, while discovery usually takes a company 150 days. Take a look at this article to discover ways your organization can prepare for GDPR to ensure you are compliance ready by May 2018.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

IBM

Essential Guide: What the EU Data Protection Regulation changes mean to you
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This Essential Guide offers you news, tips and features on how the new regulations may affect you and your organisation.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

ComputerWeekly.com

Advanced Threat Prevention for Workloads in AWS
sponsored by AWS - Check Point
WHITE PAPER: Once an organization decides to move to the cloud, the next consideration should be determining which cloud deployment model securely meets the needs of the organization. This white paper provides insight into the challenges of transitioning to the AWS cloud while protecting apps and data.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

AWS - Check Point

Credential Stuffing a Security Epidemic
sponsored by F5 Networks
WHITE PAPER: 81% of hacking-related breaches include leveraging of usernames and passwords, according to the 2017 Verizon DBIR. This e-book provides insight into credential stuffing attacks as well as a guide to stopping credential theft.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

F5 Networks
1 - 25 of 2614 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement