IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
126 - 150 of 2315 Matches Previous Page  |  Next Page
The Threat Landscape of 2015
sponsored by Forcepoint
WHITE PAPER: This report examines new technological trends and discusses what these trends mean for your security.
Posted: 19 Jan 2016 | Published: 14 Sep 2015

Forcepoint

How to Vet and Deliver Better Mobile App Security
sponsored by Kony
EGUIDE: This complimentary resource provides two articles direct from the experts at SearchSecurity.com on how to achieve better mobile app security. Learn how to design a mobile-app security policy and discover four steps for vetting and delivering secure mobile apps.
Posted: 19 Jan 2016 | Published: 19 Jan 2016

Kony

Forrester Total Economic Impact (TEI) Study of IBM Security Guardium
sponsored by IBM
WHITE PAPER: In this white paper you will learn how to improve process efficiency while meeting security and compliance requirements. Continue reading to learn how you can reduce the time and cost of compliance.
Posted: 19 Jan 2016 | Published: 30 Sep 2015

IBM

A Guide to Cyber Risk
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Insurer Allianz Global Corporate & Specialty (AGCS) examines the latest trends in cyber risk and emerging perils around the globe.
Posted: 19 Jan 2016 | Published: 19 Jan 2016

ComputerWeekly.com

Data Theft Prevention: The Key to Security, Growth and Innovation
sponsored by Forcepoint
WHITE PAPER: In this white paper, you will discover how Data Theft Prevention allows you to successfully embrace technological change and new opportunities.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

Forcepoint

Spear Phishing: The Secret Weapon Behind The Worst CyberAttacks
sponsored by Cloudmark
RESOURCE: Don't underestimate spear phishing attacks as this infographic lays out the severe impact of the 10 worst cyberattacks and presents the revenue losses suffered. View now to learn from these previous attacks and protect your business's reputation from the damages these organizations faced.
Posted: 18 Jan 2016 | Published: 06 Jan 2016

Cloudmark

Realizing the Value of Test Data Management
sponsored by CA Technologies.
WHITE PAPER: This paper describes common problems and potential benefits of Test Data Management (TDM) in a testing and development environment. Debunk assumptions that could be holding you back from better TDM, learn why masking production data is not a simple solution, and discover a more efficient and easier TDM policy.
Posted: 18 Jan 2016 | Published: 31 Aug 2015

CA Technologies.

Migrating Your Company's PCs: Best Practices and Tips
sponsored by Acronis
WHITE PAPER: This white paper provides best practices and guidelines for ensuring your backup systems are prepared when migrating current, outdated PC fleet to new PCs, laptops, and tablets. Read on to learn how an efficient, reliable backup solution can allow you to migrate to new PCs smoothly and successfully.
Posted: 18 Jan 2016 | Published: 31 Dec 2014

Acronis

Bad Data is a Customer Experience Killer: Evaluating Today's Data Quality Solutions
sponsored by Trillium Software
RESOURCE: In this report for enterprise architecture (EA) pros, you will determine the right partner for your data quality needs. Access this report to tailor your data quality services to your customer ecosystem and accommodate for a wide array of applications, big data environments, and the cloud.
Posted: 18 Jan 2016 | Published: 31 Dec 2015

Trillium Software

Compliant Calling: How Mobile Industry Regulations Influence Financial Services
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will discover how to enforce the highest standard of call compliance in your enterprise by ensuring mobile calls are recorded and under the control of network administrators. Access this white paper to understand how financial organizations are addressing the challenges of mobile call recording compliance.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

BlackBerry

World Quality Report 2015-16
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The annual World Quality Report examines the state of application quality and testing practices across multiple industries and geographies
Posted: 18 Jan 2016 | Published: 18 Jan 2016

ComputerWeekly.com

A Case for IT Security: The Future of New EU Data Protection
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
Posted: 15 Jan 2016 | Published: 19 Jan 2016

ComputerWeekly.com

Best Practices for Securing AWS Instances
sponsored by CloudPassage
WEBCAST: In this webcast, security pros will explore the security challenges AWS computing presents and they offer 7 best practices to secure cloud environments faster. Watch now to learn more.
Posted: 15 Jan 2016 | Premiered: Dec 4, 2015

CloudPassage

World Quality Report 2015
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The speed of digital transformation is increasing the importance and pressure on quality assurance testing, according to the World Quality Report by Capgemini and Sogeti.
Posted: 15 Jan 2016 | Published: 15 Jan 2016

ComputerWeekly.com

Case Study: Online Education leader Chooses Flash to Manage Unpredictably Fast Growth
sponsored by EMC
CASE STUDY: This case study focuses on how Connections Education implemented a scalable flash storage array to manage their growing data and customer base. Read on to see how this flash array can allow your enterprise to manage high data volumes and maintain protection and high availability during peak loads for all mission-critical systems.
Posted: 15 Jan 2016 | Published: 31 Dec 2014

EMC

A CIO's Guide to the Data Quality Tools Market: Benefits and Shortcomings
sponsored by Trillium Software
WHITE PAPER: In this CIO white paper, you will evaluate the current data quality tool market's offerings. Read on to learn how to deploy metadata management, adaptors for specific data structure types, and more in your IT infrastructure to bolster operations support.
Posted: 15 Jan 2016 | Published: 18 Nov 2015

Trillium Software

Podcast: Cloud Access Security Brokers: Real World Use-Cases
sponsored by BitGlass
PODCAST: This podcast, the third in a series on the top brokers of cloud security, discusses some real world case studies across a number of industries.
Posted: 13 Jan 2016 | Premiered: Jan 5, 2016

BitGlass

Podcast: Cloud Access Security Brokers: Securing Office 365
sponsored by BitGlass
PODCAST: This podcast contains a description of how you can ensure that your information in Office 365 applications remains secure.
Posted: 13 Jan 2016 | Premiered: Jan 5, 2016

BitGlass

The Perceived Effectiveness of Traditional Security Solutions in the Cloud
sponsored by CloudPassage
WHITE PAPER: The report presents research from a survey of high-level security professionals at major North American organizations on their attitudes toward cloud security, key adoption drivers, and the effectiveness of traditional security solutions in cloud environments.
Posted: 13 Jan 2016 | Published: 30 Jun 2015

CloudPassage

SANS Institute Survey: Orchestrating Security in the Cloud
sponsored by CloudPassage
ANALYST REPORT: Access this report to uncover survey results about organizations use of cloud computing for their workloads and how they are keeping them secure. You'll learn the current state of cloud computing, top cloud security concerns, how to build better cloud defenses, and more.
Posted: 13 Jan 2016 | Published: 30 Sep 2015

CloudPassage

Podcast: Cloud Access Security Brokers: Critical Capabilities
sponsored by BitGlass
PODCAST: This podcast will help you protect your network by providing prospective on the brokers specialized in guarding data over the cloud.
Posted: 13 Jan 2016 | Premiered: Jan 5, 2016

BitGlass

Gartner Report: The Five Characteristics of an Intelligence-Driven Security Operations Center
sponsored by ThreatConnect
WHITE PAPER: Develop an intelligence-driven security operations center (SOC) approach by learning these 5 requirements and modify your security strategy from an exception-based process to a continuous one.
Posted: 13 Jan 2016 | Published: 02 Nov 2015

ThreatConnect

Risk Report: Hacktivism and Encryption at the Forefront of Cyber-Attacks
sponsored by SurfWatch Labs
WHITE PAPER: This white paper illustrates the latest trends in the cyber risk landscape showing how unencrypted computers and other devices plague IT. Continue reading to learn why you can't afford to ignore data and device encryption.
Posted: 12 Jan 2016 | Published: 31 Aug 2015

SurfWatch Labs

Is Your Network Safe? Identifying Most Overlooked Endpoint of Them All
sponsored by HP Limited
WHITE PAPER: In this white paper, you will highlight the most critical vulnerabilities that network-connected printers pose. Read on now to enforce user authentication, admin passwords, and printer feature restriction for your network-connected endpoints.
Posted: 12 Jan 2016 | Published: 31 Jan 2015

HP Limited

The Insecurity of Network-Connected Printers: Address Hardcopy Document Security
sponsored by HP Limited
WHITE PAPER: In this exclusive report, you will examine the risks dredged up by insecure printers and other peripheral devices in your business, as well as discover several best-in-class action strategies and practices for addressing end-point device and hardcopy document security.
Posted: 12 Jan 2016 | Published: 31 Oct 2015

HP Limited
126 - 150 of 2315 Matches Previous Page    4 5 6 7 8 9    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement