IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
126 - 150 of 2734 Matches Previous Page  |  Next Page
85% of Customers are Dissatisfied with the Authentication Process
sponsored by NICE Systems, Inc
WHITE PAPER: This infographic reveals what you can do to reduce the burden of authentication for your customers. Learn how to prevent fraud in your contact center, while minimizing interrogation and saving money on every call.
Posted: 24 Aug 2016 | Published: 24 Aug 2016

NICE Systems, Inc

Manage Risk by Protecting Apps, Data and Usage
sponsored by Citrix
WHITE PAPER: When it comes to securing vulnerabilities, especially in apps, there are 5 best practices you can follow. This white paper provides and overview of how to ensure privacy, protect sensitive information and enable compliance of apps and data without compromising workforce flexibility and productivity.
Posted: 24 Aug 2016 | Published: 31 Dec 2015

Citrix

Big Data: Securing Apache Hadoop Platform
sponsored by Intel Corporation
WHITE PAPER: While Hadoop does wonders for data management, it was not designed with security in mind. Read about Hadoop security challenges and discover 6 ways to improve Hadoop security. Find out where the balance lies between security and big data flow.
Posted: 24 Aug 2016 | Published: 30 Jun 2016

Intel Corporation

Strategy Guide for Securing the SAP Landscape
sponsored by Onapsis
WHITE PAPER: Your organization should be thinking about how best to protect SAP systems. Learn how to secure SAP by taking a largely application-oriented approach, while also applying network restrictions to underlying network devices and firewalls.
Posted: 24 Aug 2016 | Published: 01 Jun 2016

Onapsis

Can Your DR Strategy Ensure Continuity in Quality Patient Care During a Disaster?
sponsored by McKesson Corporation
WHITE PAPER: Explore the 5 critical pieces of a successful healthcare disaster recovery plan, and discover the best way to ensure your patients have uninterrupted quality care in the event of a disaster.
Posted: 23 Aug 2016 | Published: 23 Aug 2016

McKesson Corporation

Best Practices for Healthcare IT Disaster Recovery in the New Threat Landscape
sponsored by McKesson Corporation
WHITE PAPER: Explore expert best practices for implementing a reliable and effective disaster recovery and business continuity strategy in a healthcare organization to ensure critical patient data and systems are safe and accessible when disaster strikes.
Posted: 23 Aug 2016 | Published: 23 Aug 2016

McKesson Corporation

Protect and Recovery Data with Confidence
sponsored by IBM
PRODUCT DEMO: This demonstration tool provides an at-a-glance summary of how IBM Spectrum Protect monitors and protects your backup data. See how this tool can provide your enterprise with the ability to see your data protection world in a single view, confidence that your business will continue in event of a disaster, and more.
Posted: 23 Aug 2016 | Premiered: 23 Aug 2016

IBM

Above Security Delivers Customer Value
sponsored by Above Security
WEBCAST: It's imperative your security vendor understands your organization's tools and services to best produce services catered to your needs. They must own your issues - take them on as their own to establish the strong relationship critical for strong security control. This short webinar shows you how to achieve these things and much more.
Posted: 23 Aug 2016 | Premiered: Jun 3, 2016

Above Security

Day in the Life of a Security Admin
sponsored by RSA Softcat
WHITE PAPER: It's now easier than ever to allow users full access to all network tools and data with a single username and password combination. Learn how to set precise security requirements for each application for any user, from anywhere, to anything.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

RSA Softcat

Onapsis Research Labs: SAP Systems Security Analysis
sponsored by Onapsis
WHITE PAPER: This Onapsis Research Labs report helps you frame the business risk of an SAP cyberattack by examining your SAP application layer for known vulnerabilities.
Posted: 22 Aug 2016 | Published: 29 Feb 2016

Onapsis

Five Ways to Secure Mobile Data with EMM
sponsored by Hewlett Packard Enterprise
EGUIDE: For most organizations it's a matter of when, not if, their data will be attacked. But enterprise mobility management (EMM) tools can help keep mobile data secure. This e-guide details five ways to secure mobile data with EMM.
Posted: 22 Aug 2016 | Published: 19 Aug 2016

Hewlett Packard Enterprise

Transform your "Good Backup" to Efficient App Availability And Recovery
sponsored by Dell, Inc.
WHITE PAPER: Discover a data protection solution with recovery options and tools that enable enterprises to achieve optimal application availability and fast restores. This single solution can provide your enterprise with the abilities to centralize data protection and recovery across your environment, recover from public cloud storage providers, and more.
Posted: 22 Aug 2016 | Published: 31 May 2016

Dell, Inc.

Ease Backup Woes with Cost-Efficient Data Archiving
sponsored by Rubrik
EGUIDE: George Crump, President of Storage Switzerland, highlights how a modern data archiving solution can dramatically reduce the amount of data that needs to be backed up and managed on a daily basis. Read on and discover multiple data archiving storage and software solutions that can save your enterprise money and ease backup issues.
Posted: 19 Aug 2016 | Published: 17 Aug 2016

Rubrik

Is Your MFT Ready for Digital?
sponsored by Axway
RESOURCE: The data universe is expanding and cyberattacks are increasing. As more businesses go increasingly digital, file sharing grows in importance. Explore what it means to securely go digital and prepare your managed file transfer platform to do the same.
Posted: 18 Aug 2016 | Published: 18 Aug 2016

Axway

Digital Business: Managed File Transfer Solutions
sponsored by Axway
WHITE PAPER: Discover a managed file transfer platform that bolsters your security during file transfer. Learn how to improve file sharing security by enabling central governance, limiting access to certain defined users, and more.
Posted: 18 Aug 2016 | Published: 18 Aug 2016

Axway

Information Security and Data Privacy Practices
sponsored by Gigya
WHITE PAPER: Explore several information security and data privacy practices that will enable you to better protect your data. Topics discussed include infrastructure, data security, compliance, privacy, and more.
Posted: 18 Aug 2016 | Published: 29 Jul 2016

Gigya

Advanced Persistent Threats and the Case for a Security Intelligence and Response Program
sponsored by Above Security
WHITE PAPER: Get a general overview of advanced persistent threats (APTs) and who needs to be concerned about their malicious activities within this white paper. Access now to fully realize the benefit of security improvements, situational awareness, and a security intelligence lifecycle.
Posted: 17 Aug 2016 | Published: 01 Jul 2016

Above Security

Ransomware
sponsored by OpenDNS
PODCAST: Ransomware. It's everywhere, with thousands of infections daily, and unknown millions being made by unknown entities. This podcast looks at ransomware and how the cybercrime business operates.
Posted: 17 Aug 2016 | Premiered: Jul 1, 2016

OpenDNS

Application Defense In Depth
sponsored by IMMUNIO, Inc.
WHITE PAPER: Discover how to build a layer of protection inside and around your apps. Learn how to control access, monitor activity, clean up input to your apps, and more.
Posted: 17 Aug 2016 | Published: 01 Jul 2016

IMMUNIO, Inc.

Extracting actionable data from banking malware
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.
Posted: 17 Aug 2016 | Published: 17 Aug 2016

ComputerWeekly.com

SC Mag Reviews a SIEM Platform
sponsored by LogRhythm, Inc.
PRODUCT REVIEW: Learn how you can upgrade to next-generation SIEM with artificial intelligence, sophisticated pattern recognition and behavioral analysis. Discover a 5-star review of a SIEM platform with a breakdown of its strengths, weaknesses and more.
Posted: 16 Aug 2016 | Published: 01 May 2016

LogRhythm, Inc.

5 Ways Virtualization Lowers Costs and Boosts Security for Healthcare
sponsored by Citrix
WHITE PAPER: Mandated IT-enabled technology, such as EHR and medical imaging, directly contributes to better patient care and reduced medical errors – but also poses a challenge for IT. Discover 5 use cases that show how virtualization can make life easier for your IT teams, improve security and result in significant cost savings to your organization.
Posted: 16 Aug 2016 | Published: 01 Jul 2016

Citrix

Ransomware: Attack Trends, Prevention, and Response
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Deepen your understanding of ransomware, and learn how to better protect your business assets from these attacks. Uncover the challenges enterprises face and find best practices to prevent future ransomware attacks and limit their impact on your organization.
Posted: 16 Aug 2016 | Published: 01 Jul 2016

Check Point Software Technologies Ltd.

Realizing the Promise of a Data Lake
sponsored by Zaloni
WHITE PAPER: From 2010 to 2020, the amount of data is expected to increase by 20 times, with 77% of relevant data being unstructured. Learn why enterprise data warehouses (EDWs) can't always deliver the necessary insights and discover how Hadoop data lakes can pick up where EDWs leave off.
Posted: 16 Aug 2016 | Published: 16 Aug 2016

Zaloni

Enterprise Mobility and Security: More than Just Device Management
sponsored by Microsoft
RESOURCE: Enterprise mobility and security (EMS) offers more than simply mobile device management. Discover 5 central pain points that EMS can address, and how you can help improve your customers' experiences and needs when it comes to Office 365.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

Microsoft
126 - 150 of 2734 Matches Previous Page    4 5 6 7 8 9    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement