IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
1 - 25 of 2409 Matches Previous Page  |  Next Page
What GDPR Means for Your Security Strategy
sponsored by Dell SecureWorks
WHITE PAPER: Ensuring compliance to the GDPR is good business sense and also a business enablement opportunity for those savvy enough to capitalize on it. Discover what data security requirements are laid down by the GDPR, and how to ensure your organization is ready.
Posted: 20 Jun 2017 | Published: 20 Jun 2017

Dell SecureWorks

Big Pharma, Healthcare, Biotech & Life Sciences: How Are These Industries Handling Big Data?
sponsored by Unisys
RESEARCH CONTENT: According to new research, 215 executives and IT professionals in the pharmaceutical industry reveal that big data has become a key priority. But organizations must take time to fulfill the potential of large data sets and ensure cyber security. Uncover how big pharma is using big data, and how they're overcoming associated challenges.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

Unisys

Top 10 Reasons Why Dell EMC Data Domain is the Industry Leading Protection Storage
sponsored by Dell EMC Intel®
WHITE PAPER: Dell EMC Data Domain is one of the industry's leading data protection and storage platforms, but what are the factors that truly differentiate it from the other options on the market? Uncover 10 reasons why Data Domain is standout protection storage.
Posted: 19 Jun 2017 | Published: 31 May 2017

Dell EMC Intel®

Top 7 Reasons to Optimize Network Security with a Security Delivery Platform
sponsored by Gigamon
EBOOK: Uncover the top 7 reasons to optimize your network security model with a security delivery platform, ranging from evolving attacks like malware-as-a-service to the rise of SecOps.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

Gigamon

Sungard AS Data Protection Customer Case Study
sponsored by Dell EMC and Intel®
CASE STUDY: Explore how Sungard AS implemented a scalable data protection infrastructure that enables faster backups and disaster recoveries. Find out how they created a "Protect My Data" managed data vaulting service, expanded protection storage for virtually any app, improved deduplication and backups, and more.
Posted: 16 Jun 2017 | Published: 31 Dec 2016

Dell EMC and Intel®

TIBCO Spotfire Server Overview
sponsored by TIBCO Software Inc.
VIDEO: With its role-based access permissions, TIBCO Spotfire incorporates data discovery, data wrangling, and predictive analytics into a cohesive platform. Learn how to leverage a variety of key resources and services that scale.
Posted: 16 Jun 2017 | Premiered: 21 Feb 2017

TIBCO Software Inc.

Top 10 Reasons Why Dell EMC Data Domain is the Industry Leading Protection Storage
sponsored by Dell EMC and Intel®
WHITE PAPER: Dell EMC Data Domain is one of the industry's leading data protection and storage platforms, but what are the factors that truly differentiate it from the other options on the market? Uncover 10 reasons why Data Domain is standout protection storage.
Posted: 15 Jun 2017 | Published: 31 Dec 2016

Dell EMC and Intel®

Top Reasons to Choose Dell EMC Data Protection Over HPE
sponsored by Dell EMC and Intel®
WHITE PAPER: Find out how to achieve truly scalable, cost-effective data protection and backup. Plus, discover 8 reasons to consider Dell EMC data protection when building your strategy for securing data in cloud and virtual environments.
Posted: 14 Jun 2017 | Published: 31 Dec 2016

Dell EMC and Intel®

10 Tips for Selecting a Digital Signature System
sponsored by Microsoft
WHITE PAPER: This white paper explores how to incorporate an e-signature system into your digital document management strategies. Uncover 10 questions to ask when selecting a digital signature tool.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

Microsoft

Analyzing the Malware Threat
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Find out how malware is evolving to circumvent commonly used defensive measures by learning to avoid behavior detection. Learn more about how this advanced malware functions, how to identify it, and how to neutralize it with cloud generation malware analysis.
Posted: 14 Jun 2017 | Published: 28 Feb 2017

Symantec & Blue Coat Systems

The App is the Endpoint
sponsored by Blue Cedar
WHITE PAPER: Uncover 5 fundamental reasons why security leaders are moving away from a device management paradigm and instead are focusing on treating the app as the endpoint.
Posted: 14 Jun 2017 | Published: 31 Dec 2016

Blue Cedar

Information Protection in the Web and Cloud Era
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This white paper explores the challenges associated with protecting data in today's enterprise. Discover how a modern data loss prevention (DLP) strategy , delivered as part of a cloud-based web security gateway, can provide continuous protection of sensitive data.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

Symantec & Blue Coat Systems

Compliance: The 'Privacy By Design' Approach To Secure Personal Data
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how implementing security best practices with "Privacy by Design" built-in will make businesses more prepared while reducing risks and costs. Plus, discover 6 recommendations for organizations that have to comply with GDPR.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

Symantec & Blue Coat Systems

A Computer Weekly Buyer's Guide to EU General Data Protection
sponsored by ComputerWeekly.com
EBOOK: The race is on to get ready for GDPR next year. In this 16-page buyer's guide, Computer Weekly looks at how to deal with data under the regulation, how compliance will affect businesses, and what organizations should do to prepare.
Posted: 12 Jun 2017 | Published: 30 May 2017

ComputerWeekly.com

Computer Weekly – 13 June 2017: Tips for buying hyper-converged systems
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the growing market for hyper-converged infrastructure, and assess the options available. We ask mature users of the cloud what's next for their migration to off-premise systems. And we analyse how retail supply chains are developing to keep up with online and mobile shopping trends.
Posted: 12 Jun 2017 | Published: 13 Jun 2017

ComputerWeekly.com

4 Pillars Behind The Evolution Of End-User Computing
sponsored by VMware
WHITE PAPER: Download this white paper to discover a simple and secure enterprise platform that delivers and manages any app on any device. By integrating identity management, real-time application delivery, and EMM, the platform engages digital employees, reduces the threat of data leakage, and modernizes traditional IT operations for the mobile-cloud era.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

VMware

IoT in Retail: Engaging the Connected Customer
sponsored by SAS
RESEARCH CONTENT: Discover how retailers can optimize their management of IoT data to anticipate customer needs and engage them where they choose to connect – mobile, in-store, or online. Find out how to update your analytics strategy to handle IoT volumes in order to generate insights that empower you to keep up with connected customers.
Posted: 08 Jun 2017 | Published: 31 Dec 2016

SAS

Securing and Illuminating the Pharmaceutical Supply Chain
sponsored by Unisys
WHITE PAPER: Lack of transparency in the supply chain means a lot of pharmaceutical companies are delivering meds that could be damaged or counterfeit. Learn how one vendor is taking steps to secure and illuminate the entire pharmaceutical supply chain by identifying authentication issues.
Posted: 06 Jun 2017 | Published: 06 Jun 2017

Unisys

Universal Storage for Data Lakes: An ESG Evaluation
sponsored by Dell EMC and Intel®
WHITE PAPER: This ESG paper challenges the de facto standard of direct-attached storage, and in it you will discover how scale-out NAS mitigates the challenges associated with data lake storage. Read on to see outlined the storage selection criteria for data lakes, which includes in-place analytics, accessibility by multiple app types, and more.
Posted: 06 Jun 2017 | Published: 30 Nov 2017

Dell EMC and Intel®

The Impact of IoT in the Manufacturing Sector
sponsored by Aruba Networks
VIDEO: Watch this brief video to learn how to connect IoT data from sensors on disparate devices to a single, common platform that allows manufacturers to bolster security, integrate siloed data and workflows, collaboratively share insights across teams, and more.
Posted: 06 Jun 2017 | Premiered: 27 Feb 2017

Aruba Networks

How IoT-Powered Smart Offices Boost Efficiency and Innovation
sponsored by Aruba Networks
VIDEO: Sound IoT strategies promise better productivity and innovation, and bad ones threaten security breaches and wasted investments. Learn how to improve your IoT/big data strategy and apply to data integration, data security, collaboration, and more.
Posted: 05 Jun 2017 | Premiered: 27 Feb 2017

Aruba Networks

GDPR: Finding Your Most Sensitive Data
sponsored by Informatica
WEBCAST: What is the General Data Protection Regulation (GDPR)'s relationship with your data? Join data experts Paul Garstang and Steve Holyer as they identify the challenges facing companies when it comes to the GDPR, how to get started with data discovery and classification, and how to use Secure@Source for data intelligence and security.
Posted: 02 Jun 2017 | Premiered: May 22, 2017

Informatica

Your Business Is Only As Fast As Your Data: Data Management Playbook
sponsored by Google Cloud
ANALYST REPORT: This data management overview from Forrester Research explains the need to enable self-service access to real-time data. Use the 12 reports in this data management playbook to discover, plan, act, and optimize your data management practices.
Posted: 02 Jun 2017 | Published: 11 Mar 2016

Google Cloud

Develop Your Information Security Management System
sponsored by SAI Global IT Risk Manager (Formerly Modulo Risk Manager)
RESEARCH CONTENT: This Forrester Research report explores how to use an information security management system (ISMS) to improve risk management and strengthen security processes. Find out how to derive daily value from an ISMS, increase customer data protection, leverage KPIs and threat intelligence, and more.
Posted: 01 Jun 2017 | Published: 19 Jan 2017

SAI Global IT Risk Manager (Formerly Modulo Risk Manager)

Object Storage Architecture: Mitigating Complexity, Capacity, and Archival Concerns
sponsored by HGST
EGUIDE: This expert resource serves as your full guide to object storage implementation, with cloud workload, sync-and-share, API-accessible storage, and more use cases examined. Download now to gain full access, learning how object storage maintains the unstructured data deluge, and view an object vs. file vs. block storage bake off.
Posted: 21 Jun 2017 | Published: 12 Jun 2017

HGST
1 - 25 of 2409 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement