IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
1 - 25 of 2374 Matches Previous Page  |  Next Page
FS & GDPR - The Path To Compliance
sponsored by Informatica
WEBCAST: In financial services institutions, there are challenges to overcome when it comes to data: An overabundance of customer data, enterprise data governance isn't a widespread practice, and disparate technology to manage data. Learn how complying with the General Data Protection Regulation (GDPR) can help you overcome some of these challenges.
Posted: 25 May 2017 | Premiered: May 23, 2017

Informatica

Managing IoT Data: What to Consider
sponsored by Bayshore Networks
RESEARCH CONTENT: In this interview with Carrie MacGillivray, the vice president for IDC's IoT and mobility teams, learn about two key issues: How to protect IoT data, and how to transform it into meaningful insights that enhance decision-making.
Posted: 24 May 2017 | Published: 31 Dec 2016

Bayshore Networks

Moving Mountains: Tackling Disparate Systems with Data Integration
sponsored by Globalscape
EBOOK: This e-book explores how to create a data integration roadmap for complex, disparate systems management. Discover how to mitigate potential data security risks and reduce maintenance costs with managed file transfer (MFT), and uncover 4 signs that you're facing disparate systems challenges.
Posted: 23 May 2017 | Published: 23 May 2017

Globalscape

Managing Machine Data from POS, IoT, Sensors, and Other Data Sources
sponsored by Splunk
WHITE PAPER: This white paper explores how to enhance your big data strategies so that you can derive actionable intelligence from your organization's machine data. Discover how to optimize the value of your machine data from point-of-sales (POS) systems, IoT sensors, smart devices, and more to support analytics and data security.
Posted: 23 May 2017 | Published: 23 May 2017

Splunk

Do You Know Where Your Data Is? Three Common Data Management Problems & How to Fix Them
sponsored by Globalscape
WHITE PAPER: Knowing the location of your data plays a crucial role with keeping it secure. When you find yourself jumping through hoops in order to protect, monitor, or report on your data, then you're not getting the most out of your IT infrastructure. Is your current IT infrastructure helping you—or hurting you? Access this e-book to find out.
Posted: 23 May 2017 | Published: 23 May 2017

Globalscape

Middleware and Operating System Machine Data
sponsored by Splunk
WHITE PAPER: This white paper explores how to enhance your big data strategies so that you can derive actionable intelligence from your organization's machine data. Find out how to optimize the value you get from the machine data created by middleware and OS and support data security, analytics, and more.
Posted: 23 May 2017 | Published: 23 May 2017

Splunk

The Essential Guide to Machine Data
sponsored by Splunk
VIDEO: This brief webcast explores the concept of machine data and how it works. Find out how to unify access to and correlate data between IT, app development, and security to monitor and prevent critical data breaches.
Posted: 23 May 2017 | Premiered: 06 Mar 2017

Splunk

GDPR: Understanding Your Data
sponsored by Informatica
WEBCAST: As you prepare to comply with the General Data Protection Regulation (GDPR), you must have a full understanding of the challenges you'll face in order to overcome them smoothly. Join Patrick Dewald and Guiseppe Mura of Informatica to learn how to prepare your company for the GDPR.
Posted: 23 May 2017 | Premiered: May 22, 2017

Informatica

Windows 10: The Unavoidable Upgrade
sponsored by Citrix
RESOURCE: Eliminate the challenges and complexity of a Windows 10 migration with a virtual desktop solution. Businesses need to formulate a strategy to maintain productivity and support their employees regardless of the user's chosen endpoint device or operating system. Learn how.
Posted: 19 May 2017 | Published: 19 May 2017

Citrix

The Security Compliance Countdown
sponsored by Citrix
RESOURCE: Businesses everywhere are bracing for the GDPR takeover. See what issues are causing IT anxiety and learn what you can do to get ahead.
Posted: 19 May 2017 | Published: 19 May 2017

Citrix

Your Data in the Cloud: Steps to a Seamless Migration
sponsored by Globalscape
EBOOK: 90 percent of organizations are looking at moving away from their legacy systems and into crafting a cloud strategy. Making a move to the cloud is a shift forward in many ways, and can empower organizations to accomplish much more with less. In this eBook, you'll learn about several cloud migration strategies.
Posted: 19 May 2017 | Published: 19 May 2017

Globalscape

GDPR Developments Will Dominate Storage and Compliance in 2017
sponsored by Arrow + NetApp
EGUIDE: In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.
Posted: 17 May 2017 | Published: 11 May 2017

Arrow + NetApp

The Internet of Relevant Things
sponsored by Aruba Networks
WHITE PAPER: The Internet of Things (IoT) term itself can be misleading, so it is important to consider one thing before going into a project: relevancy. Access this white paper to learn how to evaluate your IoT projects for business relevancy and better manage projects with secure networking without compromising usability.
Posted: 17 May 2017 | Published: 18 Jan 2017

Aruba Networks

IoT: How Real-Time Data and Analytics Enable Operational Intelligence
sponsored by Teradata
RESEARCH CONTENT: This white paper explores how to update your data management and analytics strategies for the increased volumes, security risks, and complexities of IoT. Learn how to improve your organization's decision-making and start planning for you future in IoT with 10 best practice recommendations.
Posted: 17 May 2017 | Published: 17 May 2017

Teradata

Political Turmoil Threatens Global IT Services Sector
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the threats to the global IT services sector caused by the political turmoil in the US and UK. Home Office IT chief Sarah Wilkinson discusses digital transformation in a large government department. And we find out how business leaders need to improve their digital skills. Read the issue now.
Posted: 15 May 2017 | Published: 16 May 2017

ComputerWeekly.com

5-Step Data Quality Framework For Data In Motion
sponsored by Infogix
WHITE PAPER: 6 out of 10 users don't trust their data – and this is all the more strengthened when data is flowing through a myriad of systems prior to analysis. The truth is, if your data is in motion, you may have data quality issues. Learn a 5-step data quality framework for data in motion.
Posted: 15 May 2017 | Published: 15 May 2017

Infogix

4 Mobile Security Insights for CISOs
sponsored by Lookout
WHITE PAPER: Discover the four mobile security insights that you must know, about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Posted: 12 May 2017 | Published: 12 May 2017

Lookout

Manage, Monitor & Secure Your IoT Deployment
sponsored by VMware
WEBCAST: The Internet of Things (IoT) is the cause of the next industrial revolution. To take advantage, your IT and OT teams need total control over their IoT use cases. Take 2 minutes to watch this webcast and learn how to manage, monitor, and secure the entirety of your IoT on-premise or in the cloud.
Posted: 12 May 2017 | Premiered: May 5, 2017

VMware

The EU General Data Protection Regulation (GDPR): A Pocket Guide
sponsored by DataStax
EGUIDE: Under the General Data Protection Regulation (GDPR), businesses that fail to comply and suffer a data breach could face huge fines. In this comprehensive pocket guide, learn what you need to know to comply with the GDPR, including a history of data protection, the rules of the Regulation itself, how to appropriately comply, and more.
Posted: 12 May 2017 | Published: 12 May 2017

DataStax

Tips for Finding a Compliant DaaS Platform and 3 Security Features to Look for in a Provider
sponsored by Nerdio
EGUIDE: Finding a compliant DaaS platform isn't always easy. Every organization has their own unique requirements when it comes to compliance and security needs. Use this e-guide to discover tips for finding a platform that meets your organization's needs, and discover 3 security features to look for in a provider.
Posted: 11 May 2017 | Published: 05 May 2017

Nerdio

Bracing for Digital Disruption: What the CIO Needs to Know
sponsored by Infor
WHITE PAPER: This white paper is the CIO's strategy guide to bracing for digital disruption. Learn how to shepherd the launch of new implementations and step into the future with confidence.
Posted: 10 May 2017 | Published: 28 Feb 2017

Infor

Citrix ShareFile eases IT migration to Windows 10®
sponsored by Citrix
WHITE PAPER: Access this white paper to discover a technology that eases OS migrations making future updates simpler. And, find out how the technology allows user data to be freed from devices, protected from overwrites and under your control.
Posted: 09 May 2017 | Published: 09 May 2017

Citrix

Hybrid Cloud & Data Fabric For Dummies
sponsored by NetApp SolidFire
WHITE PAPER: Hybrid clouds are seeing a growth in adoption rates, but we're also seeing data management challenges arise. This guide explores these challenges to the hybrid cloud model and how a data fabric addresses them.
Posted: 09 May 2017 | Published: 31 Dec 2015

NetApp SolidFire

MobileIron and iOS: The Security Backbone for the Modern Enterprise
sponsored by MobileIron
WHITE PAPER: Download this white paper to discover an EMM solution that provides a comprehensive platform that protects enterprise information wherever it lives: in the datacenter, in the cloud, in mobile apps, on mobile devices, and in motion between them.
Posted: 09 May 2017 | Published: 09 May 2017

MobileIron

The Investigatory Powers Act 2016 and Internet Connections Records
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
Posted: 09 May 2017 | Published: 09 May 2017

ComputerWeekly.com
1 - 25 of 2374 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement