IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
101 - 125 of 2627 Matches Previous Page  |  Next Page
Busting the Myth of the Malware "Silver Bullet"
sponsored by McAfee, Inc.
WHITE PAPER: Malware is continuing to evolve, and the next generation of it is requiring us to adopt next-level defenses. Unfortunately, there is no "silver bullet" to protect you from the lurking malware-wolf. Access this white paper to learn how to create a layered defense with complimentary tools that work in unison to fight malware threats.
Posted: 16 Nov 2017 | Published: 28 Feb 2017

McAfee, Inc.

Infographic: Top Cloud Security Concerns to Know
sponsored by McAfee, Inc.
RESOURCE: 93% of organizations are utilizing some form of cloud service, but 49% are delaying cloud deployments due to a gap in cybersecurity skills. Review this infographic to learn where the primary security concerns lie and how to keep cloudy skies from raining.
Posted: 16 Nov 2017 | Published: 31 Jan 2017

McAfee, Inc.

Building Trust in a Cloudy Sky
sponsored by McAfee, Inc.
WHITE PAPER: There's no denying that this is the future of computing as many adopt a "cloud first" mindset, but many are still wary of the cloud's lingering reputation for poor security. Read this report to see how your cloud security strategy stacks up, which areas you may be neglecting, and how to maintain top-notch security in the "cloud first" era.
Posted: 16 Nov 2017 | Published: 31 Jan 2017

McAfee, Inc.

Essential Guide: Securing hybrid IT infrastructure
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.
Posted: 16 Nov 2017 | Published: 16 Nov 2017

ComputerWeekly.com

Embracing the Digital Workplace with Unified Endpoint Management (UEM)
sponsored by MicroFocus
WHITE PAPER: Today's workers demand access to data and apps from a variety of devices. But how can your organization meet these demands without compromising security and compliance needs? Download this white paper to discover how the right unified endpoint management (UEM) technology can help.
Posted: 15 Nov 2017 | Published: 15 Nov 2017

MicroFocus

Preparing for the Workspace of the Future - Securing Cloud Services
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how to securely unify your cloud services and empower your employees to work from anywhere, while giving IT additional control, governance, and peace of mind.
Posted: 15 Nov 2017 | Published: 15 Nov 2017

Citrix

3-Fold Approach and Best Practices to Cyber Security
sponsored by Citrix
WEBCAST: 71 percent of organizations say that there is risk from their inability to control employees' devices and apps. Download this webcast to discover a 3 fold approach to security that secures data and apps across any device, network and cloud.
Posted: 15 Nov 2017 | Premiered: Nov 15, 2017

Citrix

HPE SimpliVity hyperconverged infrastructure for VMware vSphere
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Continuous exponential data growth has lead to the need to replace legacy IT infrastructures, and is driving the recent hyperconverged infrastructure (HCI) adoption trend. This technical white paper reviews the features and benefits of an HCI platform and describes the hardware and software components and subsystems that make up the solution.
Posted: 15 Nov 2017 | Published: 31 Jul 2017

Hewlett Packard Enterprise

Zero Impact Database Migration
sponsored by Quest
WHITE PAPER: Discover how to navigate the most common pitfalls of migrating from Oracle to SQL Server with tools that enable seamless data replication across platforms.
Posted: 15 Nov 2017 | Published: 15 Nov 2017

Quest

Why Organizations Still Struggle To Digitally Transform & Innovate
sponsored by Veeam Software
WHITE PAPER: An overwhelming majority are struggling with availability and protection gaps, which are leading to data loss, impeded operating environments, and delayed digital transformation efforts. Access this report for survey results on how organizations struggle to bridge these gaps and ways you can cross them.
Posted: 15 Nov 2017 | Published: 15 Nov 2017

Veeam Software

Big Data Management for Dummies
sponsored by INFORMATICA
EBOOK: This "For Dummies" e-book explores how to execute a sound big data management strategy, built on the 3 pillars of integration, governance, and security. Learn about the tenets of effective big data management and discover 10 essential big data tips.
Posted: 15 Nov 2017 | Published: 15 Nov 2017

INFORMATICA

A Collaborative Integration for IAM
sponsored by SailPoint Technologies
WHITE PAPER: This paper provides a collaboration strategy of integrating Microsoft Azure Active Directory with SailPoint Identity Governance to improve your IAM approach.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

SailPoint Technologies

Top Cyber Threats to the Technology Sector
sponsored by Digital Shadows
WHITE PAPER: Technology providers collect sensitive customer data, causing them to be popular targets for cyberattacks. Explore this white paper to learn about the top 4 threats facing technology companies today, and learn from recent attacks to ensure your data is secured.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

GDPR Quick Start Guide
sponsored by MarkLogic
WHITE PAPER: According to an Osterman Research Report, 64% of organizations are not ready to comply with the GDPR. This paper offers a quick start to GDPR with 3 key steps that will put you on the right track to maintaining GDPR compliance.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

MarkLogic

Top Cyber Threats to The Retail Sector
sponsored by Digital Shadows
WHITE PAPER: Given the frequent number of transactions taking place using payment cards, retail companies are frequently the target of financially-motivated threats. Explore this white paper to uncover the top 3 cyber threats to the retail sector to help you monitor and manage digital risks.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

The Pressing Need for Digital Risk Management
sponsored by Digital Shadows
WHITE PAPER: According to ESG research, 69% of organizations are increasing their cybersecurity budgets. This ESP report reveals how CISOs and risk officers can adopt a thorough risk management strategy to protect their enterprise from pressing cyber threats.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

Ensuring Business Continuity for Critical Healthcare Applications
sponsored by Hewlett Packard Enterprise
CASE STUDY: Belgian healthcare provider Practimed's legacy IT environment—a mix of stand-alone servers and storage arrays—had become too costly and risky to maintain and scale. Access this case study to see how Practimed was able to leverage hyperconverged infrastructure to overcome these challenges and more.
Posted: 14 Nov 2017 | Published: 30 Jun 2017

Hewlett Packard Enterprise

Moving your Database to the Cloud
sponsored by Quest
WHITE PAPER: Explore how to move your databases to the cloud as well as what the consequences of that that move are. Deepen your understanding of the cloud, from its elasticity to potential for self-service, and learn about different deployment and service models for the cloud.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Quest

2018 Database DevOps Survey
sponsored by DBMaestro
WHITE PAPER: Inside, uncover key findings from DBmaestro's annual Database DevOps Report, along with the challenges and best practices of companies using or looking to implement DevOps for databases.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

DBMaestro

Demystifying Cloud Security
sponsored by Workday
WHITE PAPER: Enterprises deploy more applications to more endpoints than ever before, making them great targets for hackers. Take a look at this white paper to gain insight into how shifting to the cloud can protect your company's increasing applications and endpoints.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Workday

Top Cyber Threats to the Legal Sector
sponsored by Digital Shadows
WHITE PAPER: Legal firms can be attractive targets for cybercriminals, especially firms working on mergers and acquisitions (M&A), possessing a large amount of sensitive, non-public information. This paper highlights 3 security risks for legal firms to focus on and how to mitigate them.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Top Cybercrime Threats to Financial Institutions
sponsored by Digital Shadows
WHITE PAPER: The most prevalent cybercrime threats against financial institutions are: the use or sale of ATM malware, targeted network intrusions, data breaches and the use of banking Trojans. Take a look at this white paper to learn more about these financial threats that stem from cybercriminals.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Protect Your Customer and Employee Accounts
sponsored by Digital Shadows
WHITE PAPER: Digital Shadows found that 97% of the largest companies in the world had their credentials exposed. Explore this white paper to learn how to mitigate the growing risks of account takeovers and the measures you can take to ensure your organization is better protected.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Direct Sales Organization Modernizes IT Infrastructure
sponsored by Hewlett Packard Enterprise
CASE STUDY: Princess House was plagued with aging IT systems that were becoming increasingly inefficient, risky, and costly. They needed to refresh and streamline their IT infrastructure and boost data protection for mission-critical applications. Read this case study to see how they leveraged hyperconverged infrastructure to meet these challenges.
Posted: 13 Nov 2017 | Published: 30 Jun 2017

Hewlett Packard Enterprise

Security Automation and Orchestration Best Practices
sponsored by ServiceNow
WEBCAST: According to a recent Forrester Research Survey, 68% of respondents state that using automation and orchestration tools to improve security operations is a high or critical priority. Watch this webcast to gain insight into security automation and orchestration (SAO) best practices and a roadmap for deployment.
Posted: 13 Nov 2017 | Premiered: Nov 13, 2017

ServiceNow
101 - 125 of 2627 Matches Previous Page    3 4 5 6 7 8    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement