IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
101 - 125 of 2398 Matches Previous Page  |  Next Page
Cyber-physical attacks: Dawn of a new age in cyber-warfare?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series explores the application of cyber power in international relations
Posted: 14 Mar 2017 | Published: 14 Mar 2017

ComputerWeekly.com

Digital Innovations and Changing Demographics are Redefining Government by the People, for the People
sponsored by HPE and Intel® Xeon
WHITE PAPER: Access this paper to learn about communicating with the different generations of people and how you'll have to handle your data. Learn how to find the right mix of traditional IT, cloud, security and mobility to provide the greatest service possible.
Posted: 07 Mar 2017 | Published: 30 Dec 2016

HPE and Intel® Xeon

CW Europe – March 2017
sponsored by ComputerWeekly.com
EZINE: Technology advancements in recent years have brought about huge social challenges. Artificial intelligence and big data, for example, have gained the serious attention of policy makers across the world.
Posted: 06 Mar 2017 | Published: 09 Mar 2017

ComputerWeekly.com

Data Protection & Privacy: Next Steps and 5 Best Practices
sponsored by HPE and Intel® Xeon
WHITE PAPER: The internet and data privacy laws have been on a collision course for some time now – and it's accelerated by digital transformation sweeping across companies. Inside, explore the challenges that global businesses face when confronting the policy environment, and find 5 best practices to help you meet evolving data privacy and security demands.
Posted: 28 Feb 2017 | Published: 28 Feb 2017

HPE and Intel® Xeon

Digital Remote Monitoring and How it Changes Data Center Operations and Maintenance
sponsored by APC by Schneider Electric
WHITE PAPER: A lot happens in 10 years, and data center remote monitoring services have come a long way. Access this white paper to learn about digital remote monitoring services, how they support your data center and mobile technologies, and why it's time to replace any lingering offline monitoring.
Posted: 28 Feb 2017 | Published: 30 Dec 2016

APC by Schneider Electric

Backup target features expand use cases and evolve for better data protection
sponsored by Hedvig Inc
EGUIDE: Disk-based backup targets have evolved to become far more than just cheap disk arrays. It is vital to understand the different capabilities these systems can offer. In this guide discover new features such as in-place recovery - that allows a virtual machine to instantiate its data store directly from an appliance.
Posted: 15 Feb 2017 | Published: 13 Feb 2017

Hedvig Inc

How to Keep Your Data Secure In An Increasingly Insecure World
sponsored by Micron
WHITE PAPER: Digital information has completely transformed the way we live and do business. But with this change comes the need for strong data security measures to protect vital information. In this white paper, explore important data security topics and considerations, including data breaches, regulations and standards, drive decommissioning and more.
Posted: 13 Feb 2017 | Published: 01 Nov 2015

Micron

Building Trust in a Cloudy Sky
sponsored by McAfee, Inc.
RESEARCH CONTENT: 90% of companies now use cloud services, not all of it sanctioned by IT. Moreover, more sensitive data is being stored in the cloud outside the visibility and control of IT. Learn more "Building Trust in a Cloudy Sky."
Posted: 10 Feb 2017 | Published: 31 Jan 2017

McAfee, Inc.

How to Prepare for Out-of-Control Data Growth
sponsored by Micron
WHITE PAPER: If you're ready for a storage refresh, access this infographic to prepare for the big data deluge by adopting flash to extend scalability, enhance virtualization support, simplify storage capacity management, and more. You'll also clue into the main drivers behind software-defined storage adoption, as told by IT pros.
Posted: 09 Feb 2017 | Published: 09 Feb 2017

Micron

The Essential Guide Data Protection and Disaster Recovery
sponsored by Tintri
WHITE PAPER: Download this guide to understand the must-have storage features that are essential to modern DP and DR practices;provided are specific guidelines on what to look for, how to strategize DR in your organization, and more.
Posted: 24 Mar 2017 | Published: 24 Mar 2017

Tintri

EMM Real Benefits in Today's Mobile World
sponsored by vmware airwatch
WHITE PAPER: The economy isn't standing still. For your business to succeed, your employees shouldn't either. This eBook relays the importance of unifying your infrastructure to deliver apps effectively across multiple devices. Learn how to stay on top of security and consistency with enterprise mobility management.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

vmware airwatch

Five Key Indicators that You Need to Adopt EMM Now
sponsored by vmware airwatch
WHITE PAPER: How do you know if your organization is ready to make the move to enterprise mobility management (EMM)? Read this white paper to determine if it is the right time to adopt EMM, especially if your organization experiences: Increased need for security and compliance, device expansion or rapid growth.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

vmware airwatch

Customer Success Stories: Unified Endpoint Management
sponsored by vmware airwatch
EBOOK: End users expect to be able to work anywhere, at any time, and from any device. They expect a similar experience for accessing work apps and data across all their devices. Download now to learn why leading organizations around the world rely on VMware AirWatch unified endpoint management for their enterprise mobility solution.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

vmware airwatch

The Massive Mobile Migration
sponsored by IBM
WHITE PAPER: The move to mobile devices, data and apps to make work happen anytime, anywhere is continuing to experience massive adoption. Download this infographic to see the numbers you can't ignore this year.
Posted: 03 Mar 2017 | Published: 27 Apr 2016

IBM

UBM Dark Reading & VMware AirWatch® Webinar
sponsored by vmware airwatch
WEBCAST: In this session, we'll cover how VMware Workspace™ ONE™ can help drastically simplify the deployment of Office 365 and provide the security controls to protect your sensitive information that is stored in corporate email, OneDrive, and SharePoint.
Posted: 03 Mar 2017 | Premiered: Mar 3, 2017

vmware airwatch

The Current State of Blockchain Compliance
sponsored by BAE Systems Applied Intelligence
EGUIDE: In this expert e-guide, we examine blockchains and how they're affecting digital enterprise assets and cybersecurity. Discover how these distributed ledgers relate to Bitcoin and data security. Plus, learn how blockchain innovation and apps like smart contracts are affecting compliance.
Posted: 01 Mar 2017 | Published: 24 Feb 2017


Artificial Intelligence and Machine Learning: Cybersecurity Advances
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at machine learning in security and how recent advances may bolster your defenses.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

SearchSecurity.com

When Downtime Takes a Bite out of Your Budget
sponsored by Globalscape
EBOOK: Unplanned downtime and data loss will ultimately affect an organization's bottom line. Discover how to develop a robust data protection strategy that helps defend your most critical assets and learn how to create visibility into data transfers, meet compliance, simplify disaster recovery, and more.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Globalscape

Secure Information Exchange in the Digital Age
sponsored by OpenText
WHITE PAPER: Forrester Senior Analyst Heidi Shey answers five questions regarding secure information exchange (SIE) and discusses how digital transformations are changing the way that IT decision-makers have to approach SIE in the digital age.
Posted: 27 Feb 2017 | Published: 31 Jan 2017

OpenText

Your Data on the Move: Taking Back Control of Your Most Precious Asset
sponsored by Globalscape
WHITE PAPER: This white paper examines some of the risk factors organizations face when managing their data and explores best practices for conducting risk assessments. Read on to learn about 3 main risk factors threatening your organization, 3 signs you've lost control of your data, 4 steps to regaining control over your data, and more.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Globalscape

Seeking secure Wi-Fi
sponsored by MicroScope
EZINE: An issue looking at the issues around wireless networking, the dangers of advertising with some hints of verticals that are spending
Posted: 24 Feb 2017 | Published: 24 Feb 2017

MicroScope

How to Plan Your Hybrid Cloud Backup Strategy
sponsored by Colospace Inc.
EGUIDE: Considering using hybrid cloud to backup your business? It can get complicated very quickly if you're not sure what you're doing. This e-guide walks you through everything you need to know to establish, or strengthen, your cloud backup strategy.
Posted: 08 Feb 2017 | Published: 06 Feb 2017

Colospace Inc.

Cloud Security and Content Management: Box Case Study
sponsored by IBM
WHITE PAPER: Learn how to secure Box on the cloud, and in doing so yield more benefits than just keeping your data safe.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

IBM

Box: Securing Business Information in the Cloud
sponsored by IBM
WHITE PAPER: Learn how to address content security challenges with Box on the cloud and enable productivity and collaboration with anyone, anywhere, and at any time, while maintaining control and compliance over your business content.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

IBM

ECM and Collaboration: Transforming Work in the Cloud
sponsored by IBM
WEBCAST: This webcast explores how to enable sound content management, even in an era of growing reliance on cloud and mobile computing. Discover how to implement a content strategy that unlocks benefits like simplified end-user experiences, accelerated collaboration, cloud-capable ECM, secure file sync and share across all devices, and more.
Posted: 03 Feb 2017 | Premiered: Feb 3, 2017

IBM
101 - 125 of 2398 Matches Previous Page    3 4 5 6 7 8    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement