IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
126 - 150 of 2554 Matches Previous Page  |  Next Page
Leading Health Insurer Scales Security across More than 2500 Databases
sponsored by Trustwave
CASE STUDY: Mitigating database security threats and meeting compliance requirements can be difficult. Check out this case study to uncover how one health insurer streamlined its database security and compliance efforts, helping them save time and money.
Posted: 17 Aug 2017 | Published: 31 Dec 2015

Trustwave

Honda Dealer Recovers from Ransomware
sponsored by Acronis
CASE STUDY: Take a look at this Honda dealership case study on how they overcame data loss and malware attacks by leveraging the cloud.
Posted: 16 Aug 2017 | Published: 31 Aug 2016

Acronis

Information Governance in the Cloud: How to Build a Game Plan
sponsored by Box
WEBCAST: Learn about information governance and how it helps protect content in the cloud and on mobile devices to meet increasing strict compliance regulations. Plus, find out how Engle Martin & Associates revitalized their content management and information governance strategy.
Posted: 16 Aug 2017 | Premiered: Aug 16, 2017

Box

Backup Vs Business Continuity
sponsored by Datto, Inc.
EBOOK: What will serve you better in the long run, backup or business continuity? What's the difference? How quickly can you get your business operating again in case of system failure? Access this white paper to learn why business continuity is more important than simple backup solutions.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Datto, Inc.

Compliance Challenges & Security Effectiveness in the Workplace
sponsored by Citrix
RESEARCH CONTENT: This research report from the Ponemon Institute uncovers global trends in IT security risks, especially compliance with the EU's GDPR.
Posted: 16 Aug 2017 | Published: 31 Mar 2017

Citrix

Assessing the Top Content-Centric Collaboration Platforms
sponsored by Box
RESEARCH CONTENT: In this Gartner Magic Quadrant, explore the current offerings for content-centric collaboration platforms that support seamless, secure file sync and sharing across devices and cloud repositories.
Posted: 16 Aug 2017 | Published: 25 Jul 2017

Box

Are Small Firms Ready for the GDPR?
sponsored by Avnet
EGUIDE: A NetApp survey finds that smaller firms are not ready for the arrival of GDPR. This e-guide reveals the details of this survey and explores what these results mean for channel data specialists.
Posted: 15 Aug 2017 | Published: 10 Aug 2017

Avnet

Why You Shouldn't Wait to Build a Data Governance Model
sponsored by ERwin
EGUIDE: As your company amasses data from multiple sources, you can potentially lose control over data quality and accuracy. In this expert e-guide, learn why it's time to halt the data free-for-all and apply data governance to keep your organization on track.
Posted: 15 Aug 2017 | Published: 14 Aug 2017

ERwin

Exploring Five GDPR Compliance Myths
sponsored by Avnet
EGUIDE: The General Data Protection Regulation (GDPR) comes into force in May 2018, and there are a few misconceptions surrounding this legislation. This e-guide explores 5 common myths surrounding GDPR to help you prepare for the deadline.
Posted: 15 Aug 2017 | Published: 10 Aug 2017

Avnet

Are You Sure You Didn't Authorize Someone You Shouldn't Have?
sponsored by HID
WHITE PAPER: Explore lessons learned from the Google Docs phishing scam. Learn the role multi-factor authentication plays in protecting organizations from phishing attacks and other cyber threats.
Posted: 14 Aug 2017 | Published: 15 Jun 2017

HID

Storage Snapshots: An Overview on the State of Data Recovery
sponsored by Reduxio
RESOURCE: This post serves as your condensed resource on snapshots, providing an overview on snapshots' history, innovation, and use cases, as well as snapshot usage limitations. Read on to also gain a strategy for surmounting the shortcomings of snapshots, using a technique called BackDating.
Posted: 14 Aug 2017 | Published: 04 May 2016

Reduxio

How 3 Companies Leverage Machine Data to Improve Security, Solve Business & IT Challenges
sponsored by Splunk
WHITE PAPER: One of the most important – and often, most overlooked – resources that an organization can tap into to protect from cyberattacks is machine data. Learn how 3 companies are leveraging machine data to protect themselves against the latest cyberthreats and to address IT operations, IoT and business analytics challenges as well.
Posted: 14 Aug 2017 | Published: 14 Aug 2017

Splunk

Don't Overlook Email When Planning for GDPR Compliance
sponsored by Mimecast
WHITE PAPER: With the GDPR deadline less than a year away, businesses need to focus on their most critical applications, email. Uncover best practices and how to mitigate GDPR risk for email.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Mimecast

Cloud Security: 2017 Spotlight Report
sponsored by Quest
WHITE PAPER: Access this e-book to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Quest

Black Hat Survey 2017
sponsored by Thycotic
RESEARCH CONTENT: At the Black Hat 2017 cybersecurity event, more than 250 hackers were surveyed on what works and doesn't work when it comes to protecting critical data. Learn insights from the survey in this report.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Thycotic

5 Tips to Slay the Cloud Disaster Recovery Dragon
sponsored by Commvault
WHITE PAPER: As more companies look to the cloud to handle the onslaught of data, current cloud-based data recovery strategies are leaving a lot to be desired. Cloud-based DR may look like a monstrous dragon to some, but this white paper offers five control tips to a more fully enveloped cloud DR strategy. Read on here. .
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Commvault

Getting GDPR Compliant With Your Big Data Analytics
sponsored by Datameer
WHITE PAPER: Explore how to become GDPR compliant with your big data analytics. Discover 5 critical capabilities to secure and govern your data so your organization is GDPR-ready.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Datameer

Overcome Security Barriers to the Cloud
sponsored by Commvault
WHITE PAPER: Learn how to enable data security features in the cloud to avoid costly data breaches. As a bonus, discover 4 other barriers to the cloud and how to overcome these challenges.
Posted: 09 Aug 2017 | Published: 31 Dec 2015

Commvault

What is GDPR? And Why Should I Care?
sponsored by Commvault
VIDEO: The General Data Protection Regulation (GDPR) will kick in May 2018, and it will have a huge impact on how you collect and manage the personal data of EU residents, even if you're not located in Europe. Get an overview of the GDPR, including who the legislation affects and the penalties for non-compliance.
Posted: 09 Aug 2017 | Premiered: 07 Jun 2017

Commvault

Achieve Governed Self-Service Analytics at Scale
sponsored by Tableau Software
WHITE PAPER: Uncover 4 steps for successfully deploying governed self-service analytics so that you can meet the growing need for self-service analytics while still ensuring a high standard of data governance, trust, security, and monitoring.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Tableau Software

Yelp Customer Story: Secure Content with Threat Intelligence and Automated Protection
sponsored by Cisco Umbrella
CASE STUDY: Discover how Yelp fosters trust between their users and its online content by preempting potentially dangerous malware attacks and other threats with cloud-delivered automated protection and integrated threat intelligence.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Cisco Umbrella

The Need for Rapid Security Investigation
sponsored by Splunk
WHITE PAPER: Often when an issue or unsuspected attack occurs, IT teams find out too late. Explore an analytics-driven approach to security that enables organizations to respond to incidents as soon as possible.
Posted: 08 Aug 2017 | Published: 08 Aug 2017

Splunk

Data Sheet: Datameer's Big Data Preparation & Analytics Platform
sponsored by Datameer
DATA SHEET: In this product data sheet, learn about Datameer's big data preparation and analytics platform for turning complex data into business-ready information.
Posted: 08 Aug 2017 | Published: 08 Aug 2017

Datameer

Data Governance for Self-Service Analytics
sponsored by Tableau Software
WHITE PAPER: Learn how to create a data governance strategy for self-service analytics by uncovering the 4 essential elements of a refined data governance strategy. Plus, discover how to create mobile and cloud support for you data management and security initiatives.
Posted: 08 Aug 2017 | Published: 08 Aug 2017

Tableau Software

Resilience: Protecting Against the Unknown CyberSecurity Threats
sponsored by AdvizeX Technologies
RESOURCE: Just as every castle has weak points, so too does every security strategy. Learn the secrets of this data centric security model to build up your fortifications. It is a five layer defense strategy than enhances your organization's resilience against the waves of attackers and plugs the gaps so nothing can seep through.
Posted: 08 Aug 2017 | Published: 14 Feb 2017

AdvizeX Technologies
126 - 150 of 2554 Matches Previous Page    4 5 6 7 8 9    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement