IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
126 - 150 of 2379 Matches Previous Page  |  Next Page
How to Prepare for Out-of-Control Data Growth
sponsored by Micron
WHITE PAPER: If you're ready for a storage refresh, access this infographic to prepare for the big data deluge by adopting flash to extend scalability, enhance virtualization support, simplify storage capacity management, and more. You'll also clue into the main drivers behind software-defined storage adoption, as told by IT pros.
Posted: 09 Feb 2017 | Published: 09 Feb 2017

Micron

Disaster Recovery Guide
sponsored by Zerto
WHITE PAPER: Use this Disaster Recovery Guide to gain insight into the challenges, needs, strategies, and available solutions for disaster recovery and business continuity, especially in modern, virtualized environments and the public cloud. And compare different BD/DR technologies.
Posted: 03 Feb 2017 | Published: 02 Feb 2017

Zerto

Accelerating Your BDR: 7 Ways to Turn Your Turtle into a Cheetah
sponsored by QuorumLabs Inc.
WHITE PAPER: Discover 7 ways you can accelerate your backup and disaster recovery and stay ahead of your competitors.
Posted: 02 Feb 2017 | Published: 02 Feb 2017

QuorumLabs Inc.

Are we trusting social networks too much?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
Posted: 31 Jan 2017 | Published: 31 Jan 2017

ComputerWeekly.com

Are you one eDiscovery away from a budgetary meltdown?
sponsored by ComputerWeekly.com
ANALYST REPORT: Using an online object storage platform with global namespaces can provide full data protection, high availability and easily managed eDiscovery in a way that fully supports the business, say analysts Clive Longbottom and Marcus Austin.
Posted: 25 Jan 2017 | Published: 25 Jan 2017

ComputerWeekly.com

Prevention Is Not Always Foolproof: Enter Unified Cloud Backup and Recovery
sponsored by QuorumLabs Inc.
RESOURCE: Download this resource to take a brief but informative look at how unified data backup/DR provides you with the ability to execute instant recovery, offsite replication, archiving, advanced deduplication, and more. Learn how to configure your DR in minutes with a robust DRaaS cloud.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

QuorumLabs Inc.

How The US Navy Helped Transform Today's BDR Market
sponsored by QuorumLabs Inc.
WHITE PAPER: This white paper explains how the US Navy helped transform today's BDR market. Discover an agnostic solution that fits into any environment to provide backup and disaster recovery capabilities that now offers the fastest recovery in the market, as well as the easiest backups.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

QuorumLabs Inc.

Protecting your organisation from itself
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.
Posted: 06 Jan 2017 | Published: 06 Jan 2017

ComputerWeekly.com

Security for the Future-Ready Workforce
sponsored by Dell India
WHITE PAPER: To both empower the workforce and protect the enterprise, organizations must choose the right technologies and match users to the right devices. Learn how to cover the needs of 5 future-ready worker categories, while keeping your data safe.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

Dell India

Best Practices for Enterprise Security
sponsored by Citrix
WHITE PAPER: The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your modern workforce, which include network security, access management, app security, and monitoring and response.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Manage Risk by Protecting the Apps and Data that Drive Business Productivity
sponsored by Citrix
WHITE PAPER: Traditional perimeter-based security has been rendered ineffective by mobility and the cloud. In this infographic, learn how to successfully navigate the increasingly volatile IT business environment and take a new approach to information security.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Data Breaches: Is Prevention Practical?
sponsored by Palo Alto Networks
RESEARCH CONTENT: Increased reliance on digital environments only expands the attack landscape for data breaches. Explore this survey to find out how organizations are handling data breach prevention and uncover key findings about which preventative practices are most effective for data security.
Posted: 19 Dec 2016 | Published: 30 Sep 2016

Palo Alto Networks

The History of Ransomware
sponsored by KnowBe4
WHITE PAPER: Learn a brief history of ransomware, its evolution and the different malware families it's been a part of. By understanding where ransomware came from and how it's attacked in the past, you can best predict where it's going in the future and design an effective defense strategy for your organization.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Discover the Cloudification of Healthcare IT
sponsored by Pure Storage
RESOURCE: Is clinical data safe in the cloud? Is the cloud compliant? Access this post to hear what your health IT peers have to say about the cloudification of health IT, and their respective decisions to adopt, or not adopt, cloud platforms.
Posted: 09 Dec 2016 | Published: 09 Dec 2016

Pure Storage

Overcome Storage Capacity Conundrums of Genomics and Precision Medicine
sponsored by Pure Storage
WHITE PAPER: Today's fastest compute environments are prevented from delivering on their promise for genomics as a result of constrained performance of the underlying storage infrastructure. Download this resource to learn how to overcome the capacity constraints of legacy storage and harness the possibility of precision medicine.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

Pure Storage

The Current State of Data Protection in Midsize Organizations
sponsored by arcserve
WHITE PAPER: Discover why and how IT security strategies are evolving from the survey results of 283 IT service providers, resellers and consultants. Discover today's key data protection trends and concerns faced by midsized organizations.
Posted: 06 Dec 2016 | Published: 30 Nov 2016

arcserve

CW Europe: December 2016 - February 2017
sponsored by ComputerWeekly.com
EZINE: Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.
Posted: 05 Dec 2016 | Published: 15 Dec 2016

ComputerWeekly.com

How to Plan Your Hybrid Cloud Backup Strategy
sponsored by Colospace Inc.
EGUIDE: Considering using hybrid cloud to backup your business? It can get complicated very quickly if you're not sure what you're doing. This e-guide walks you through everything you need to know to establish, or strengthen, your cloud backup strategy.
Posted: 08 Feb 2017 | Published: 06 Feb 2017

Colospace Inc.

Cloud Security and Content Management: Box Case Study
sponsored by IBM
WHITE PAPER: Learn how to secure Box on the cloud, and in doing so yield more benefits than just keeping your data safe.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

IBM

Box: Securing Business Information in the Cloud
sponsored by IBM
WHITE PAPER: Learn how to address content security challenges with Box on the cloud and enable productivity and collaboration with anyone, anywhere, and at any time, while maintaining control and compliance over your business content.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

IBM

ECM and Collaboration: Transforming Work in the Cloud
sponsored by IBM
WEBCAST: This webcast explores how to enable sound content management, even in an era of growing reliance on cloud and mobile computing. Discover how to implement a content strategy that unlocks benefits like simplified end-user experiences, accelerated collaboration, cloud-capable ECM, secure file sync and share across all devices, and more.
Posted: 03 Feb 2017 | Premiered: Feb 3, 2017

IBM

The 5 Rings of Data Integration Hell Impacting Your Security
sponsored by Globalscape
WHITE PAPER: In this guide discover the 5 "rings of hell" that make meeting data integration requirements difficult and threaten the security of your data. Learn about the various scenarios which can cause data integration challenges, methods for data migration worth considering, and more.
Posted: 11 Jan 2017 | Published: 31 Dec 2016

Globalscape

How to Determine if Cloud ERP Software is Right for You
sponsored by Sage Software
EGUIDE: Most businesses wait until the pain points grow too large before accepting the need for an ERP system. In this guide, expert IT strategist Adam Boyce helps you determine if cloud ERP software can successfully future-proof your business and explores the differences between on-premise and cloud ERP software.
Posted: 21 Dec 2016 | Published: 19 Dec 2016

Sage Software

Stop Ransomware Before it Starts
sponsored by Carbon Black
EBOOK: There is no single solution to beat ransomware. Learn the history behind ransomware, how it works, and what you can do to protect your valuable assets. Through proper planning and preparations, you can defend your organization and protect your valuable assets.
Posted: 15 Dec 2016 | Published: 30 Nov 2016

Carbon Black

Eight Emerging Data Center Trends to Follow in 2016
sponsored by Chatsworth Products Europe
EGUIDE: Learn how to develop a stronger infrastructure plan that embraces the Internet of Things as it becomes more widespread. Discover what Henrique Cecci, a research director at Gartner Inc., believes are the top 8 emerging trends that will affect data center facilities moving forward.
Posted: 08 Dec 2016 | Published: 05 Dec 2016

Chatsworth Products Europe
126 - 150 of 2379 Matches Previous Page    4 5 6 7 8 9    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement