IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
101 - 125 of 2519 Matches Previous Page  |  Next Page
7 Key Considerations When Replacing Legacy Search
sponsored by Attivio, Inc.
EBOOK: Whether your employees simply aren't getting the results they need from your search app or you're looking to update your legacy search software, uncover 7 critical elements to consider when replacing your search app.
Posted: 14 Sep 2017 | Published: 14 Sep 2017

Attivio, Inc.

Evolution of Incident Response
sponsored by IBM Resilient
WHITE PAPER: A recent survey revealed that data breach and data theft outranked natural and manmade disasters and IT system failures as the largest threat to an organization's reputation. The old days of incident response, will no longer suffice to keep your organization safe. Learn how IR has evolved and how you can improve yours.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

IBM Resilient

A 5 Minute Guide to Security for Cognitive Search and Knowledge Management
sponsored by Attivio, Inc.
WHITE PAPER: Examine the resurgence of knowledge management, in conjunction with cognitive search and security, as a viable option for coordinating the vast amounts of information buried in big data environments.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

Attivio, Inc.

Focus: Datacentre Uptime
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we take a closer look at some high-profile datacentre outages of recent times and assess the toll they took on the companies involved, and look into what providers and consumers can do to protect themselves from downtime.
Posted: 12 Sep 2017 | Published: 12 Sep 2017

ComputerWeekly.com

Get Your Company GDPR-Ready: Research Study Results
sponsored by CA Technologies.
WEBCAST: The General Data Protection Regulation (GDPR) is bringing new rules and penalties for the misuse or loss of personal data. Explore the results of this Vanson Bourne research study to learn about the impacts of the GDPR, steps you can take to ready your company, enterprises' plans to purchase tools and adopt new data strategies, and more.
Posted: 12 Sep 2017 | Premiered: Sep 6, 2017, 01:01 EDT (05:01 GMT)

CA Technologies.

GDPR: The State of Play
sponsored by ComputerWeekly.com
DATA SHEET: An infographic to inform the reader of what GDPR is, how it will affect them, and when it will come into play.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

ComputerWeekly.com

GDPR Compliance: The Implications for Test Data Management
sponsored by CA Technologies.
WHITE PAPER: Learn about the key implications of GDPR regulations for test data management and explore topics like data masking, synthetic data generation, and more.
Posted: 11 Sep 2017 | Published: 31 Dec 2016

CA Technologies.

Ready, Set, Go: General Data Protection Regulation (GDPR)
sponsored by CA Technologies.
WEBCAST: With the General Data Protection Regulation (GDPR) looming in the very near future, it's extremely important to know what it is, how you can comply, and how it may affect you. In this webinar, explore recommendations by CA Technologies that can help you prepare for the GDPR's arrival.
Posted: 11 Sep 2017 | Premiered: Sep 6, 2017

CA Technologies.

What Does The GDPR Mean To You? How To Improve Your Testing And Keep Your Test Data Compliant
sponsored by CA Technologies.
WEBCAST: Data breaches are almost an everyday event – but the upcoming General Data Protection Regulation (GDPR) forces you to think differently about data breaches and how they impact your software development and testing process. Learn what you can do to avoid compromising your test data, and how CA Test Data Manager can help.
Posted: 11 Sep 2017 | Premiered: Sep 6, 2017

CA Technologies.

Trust Must Be the Foundation of Your B2B Digital Ecosystem
sponsored by IBM
WHITE PAPER: Successful management of your digital business and ecosystems is not founded on technology, but trust. This 19 page Forrester report explores the fundamental role that trust plays in your digital transformation, focusing on the role of trust in the business-to-business context.
Posted: 11 Sep 2017 | Published: 29 Mar 2017

IBM

GDPR Compliance: How Can You Adapt to the New Regulation?
sponsored by CA Technologies.
WHITE PAPER: The General Data Protection Regulation (GDPR) is set to begin in May 2018 – is your organization ready to comply? Learn from a technology perspective what's needed to comply with the GDPR. Topics covered include data breach reporting, accountability, rights and more.
Posted: 08 Sep 2017 | Published: 08 Sep 2017

CA Technologies.

GDPR Is A State of Mind: Research Report
sponsored by CA Technologies.
RESEARCH CONTENT: The European General Data Protection Regulation (GDPR) is coming – fast. In this Computing Research report, learn how 115 UK business decision-makers in large enterprises feel about the upcoming GDPR and how these concerns relate to everyday issues of storage, security and software development.
Posted: 08 Sep 2017 | Published: 01 Jun 2017

CA Technologies.

Enterprise-class Big Data for Data Analytics
sponsored by Virtustream
WHITE PAPER: Big data has been a big mystery for a long time, but the fog is starting to lift. In this white paper, you will find everything you need to use the cloud to leverage big data.
Posted: 08 Sep 2017 | Published: 08 Sep 2017

Virtustream

CW Europe – September-November 2017
sponsored by ComputerWeekly.com
EZINE: In this quarter's CW Europe, read about a political crisis in Balkan state with tech at its centre. The country has been accused of using surveillance technology for covert spying. Protests related to this were instrumental in the ruling party losing power after 10 years.
Posted: 07 Sep 2017 | Published: 07 Sep 2017

ComputerWeekly.com

EU GDPR Compliance Puts Focus on Data Tracking, Encryption
sponsored by Ivanti
EGUIDE: In this e-guide, experts explain why data tracking, encryption and other measures are crucial for GDPR compliance.
Posted: 05 Sep 2017 | Published: 31 Aug 2017

Ivanti

Data Protection: Why Cloud is the Future
sponsored by Druva Software
RESEARCH CONTENT: In this ESG research report, analysts reveal security considerations for using cloud-based data protection.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Druva Software

Anatomy of a Cyberattack
sponsored by Infocyte
WHITE PAPER: According to Ponemon, the cost of a data breach is significantly less if you contain it within 30 days. Check out this white paper to uncover the anatomy of cyberattacks to see where different "hunt tools" can be used for your protection to detect data breaches early.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Infocyte

Reducing Attacker Dwell Time
sponsored by Infocyte
WHITE PAPER: Discover how to reduce attacker dwell time with a threat hunting strategy that enables you to detect and resolve breaches to your network faster.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Infocyte

Your Employee Security Checklist: 10 Tips
sponsored by Kaspersky Lab
WHITE PAPER: Careless employees were the single biggest cause of serious incidents involving data loss or leakage— involved in 1 in 5 serious data breaches. Find 10 tips for employee security to prevent serious incidents at the employee level.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Kaspersky Lab

10 Considerations for Moving Your Contact Center to the Cloud
sponsored by Genesys
EBOOK: Explore how to migrate your contact center to the cloud with confidence and uncover 10 essential considerations for selecting a trusted partner.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Genesys

Step Up Your Security and Privacy with Data Masking
sponsored by Delphix
WEBCAST: For many organizations, the most confidential information exists in some of the least-secure environments. Learn why data masking is an effective approach to protecting sensitive environments from a variety of threats. Discover challenges and best practices for implementing data-masking tools, and more.
Posted: 07 Sep 2017 | Premiered: Aug 28, 2017

Delphix

Could the WannaCry Decryptor Work on Other Ransomware Strains?
sponsored by Cisco Umbrella
EGUIDE: After the global outbreak of the WannaCry ransomware, researchers created decryptor tools that could save affected files. In this guide, expert Matthew Pascucci explains how the tools work and if they work on other ransomware strains.
Posted: 01 Sep 2017 | Published: 29 Aug 2017

Cisco Umbrella

The Top 3 Obstacles to GDPR Compliance
sponsored by Infogix
RESOURCE: Discover the top 3 obstacles to GDPR compliance and find out how an enterprise-wide data governance program that incorporates analytics and KPIs for validating personal data quality can help you comply with GDPR regulations.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Infogix

Achieving GDPR Compliance with Data Governance
sponsored by Infogix
WHITE PAPER: Discover how to meet GDPR compliance requirements with an organization-wide data governance program that relies on collaboration, shared accountability, machine learning analytics, and enhanced data visualizations.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Infogix

Improve Endpoint Security with Advanced Tools and Techniques
sponsored by OPSWAT inc
EGUIDE: Better endpoint security protection is possible with NAC, DLP and other tools and techniques. Access this expert e-guide to learn how they fit together to improve enterprise endpoint protection.
Posted: 31 Aug 2017 | Published: 29 Aug 2017

101 - 125 of 2519 Matches Previous Page    3 4 5 6 7 8    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement