IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
151 - 175 of 2283 Matches Previous Page  |  Next Page
DLP Management and Monitoring
sponsored by IntraLinks, Inc
EGUIDE: This expert guide contains tips for adopting the most effective DLP management and monitoring system possible.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

IntraLinks, Inc

Presentation Transcript: Modern Cloud Storage Solutions
sponsored by NetApp
TRANSCRIPT: In this resource, four storage experts discuss how to maintain data retention and rapid recover time in the modern, hybrid IT environment.
Posted: 06 Jul 2015 | Published: 30 Jun 2015

NetApp

Deploying Enterprise Mobility While Ensuring Corporate Data and Device Security
sponsored by IBM
CASE STUDY: Read this case study to find out how RailCom, a versatile professional telematics specialist in the Netherlands, switched their field technicians to smartphones with ease using a flexible, cloud-based mobile solution.
Posted: 06 Jul 2015 | Published: 24 Jul 2014

IBM

Insider Threat Patterns and Ways of Prevention
sponsored by Varonis
EGUIDE: This expert guide addresses the danger of accidental insider threats, giving you insight into how to prevent these threats from happening and how you can analyze network activity to stop unusual actions.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Varonis

As Data Threats and Mandates Persist, Governance Vital to Manage Risk
sponsored by IntraLinks, Inc
EGUIDE: Read this e-guide for expert tips on implementing data governance processes that will simplify IT management while keeping your business secure.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

IntraLinks, Inc

NetApp AltaVault Cloud-Integrated Storage
sponsored by NetApp
WHITE PAPER: This solution brief highlights a particular type of storage that enables customers to securely back up data to any cloud at up to 90% less cost compared to on-premises solutions.
Posted: 01 Jul 2015 | Published: 18 Jun 2015

NetApp

NetApp Is Accelerating Your Data Protection Strategy to the Clouds
sponsored by NetApp
WHITE PAPER: This informative white paper makes it clear that improving data backup and recovery is a top priority for IT groups in organizations of all sizes.
Posted: 01 Jul 2015 | Published: 01 Jan 2015

NetApp

Manage Threats with Governance and a DLP Suite
sponsored by Varonis
EGUIDE: This expert guide discusses the benefits of both governance DLP solutions and gives advice on the most strategic ways to implement these systems.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Varonis

Designing the Modern Data Warehouse Environment
sponsored by IBM
WHITE PAPER: To trust your data, you must be informed about data governance. This white paper provides a stepping stone to ensuring the consistency, cleanliness, correctness, and security of your data. Access now to learn governance best practices.
Posted: 01 Jul 2015 | Published: 31 Dec 2014

IBM

Presentation Transcript: Modern Cloud Storage Solutions
sponsored by NetApp
TRANSCRIPT: In this resource, four storage experts discuss how to maintain data retention and rapid recover time in the modern, hybrid IT environment.
Posted: 30 Jun 2015 | Published: 30 Jun 2015

NetApp

Moving to the Cloud? Then It’s Time to Consider Software-Defined Storage
sponsored by IBM
WHITE PAPER: This white paper explains why software-defined storage (SDS) provides a flexible, as well as efficient, architectural approach to the cloud, along with lower costs through highly virtualized infrastructure, simplified management and use of commodity hardware.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

IBM

6 Steps for Preventing Insider Threats
sponsored by Varonis
WEBCAST: This webcast outlines six ways you can stay safe from the ever-present threat of insider attacks.
Posted: 26 Jun 2015 | Premiered: Jun 26, 2015

Varonis

All-Flash Arrays for Big Data Workloads
sponsored by IBM
WHITE PAPER: This white paper reveals why all-flash storage for big data is a practical option for storing your data.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

IBM

Case Study: How a Leading Bank Monitors All Its Data
sponsored by Varonis
WHITE PAPER: This case study describes how a leading bank gained the ability to monitor every bit of its data, down to the last file touch.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Varonis

Insider Threats: The Unexpected Risk
sponsored by Varonis
WHITE PAPER: This white paper reveals just how prevalent insider threats are and gives you advice on stopping them.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Varonis

Inside Big Data for Finance
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper outlines the best strategies for utilizing big data in the financial sector.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

Dell, Inc. and Intel®

Why You Need an Audit Trail
sponsored by Varonis
VIDEO: This brief video introduces a way to obtain an audit trail that gives you all the benefits of auditing without any of the drawbacks.
Posted: 25 Jun 2015 | Premiered: 25 Jun 2015

Varonis

Get Control of Cloud Based File Synchronization Services
sponsored by Varonis
WHITE PAPER: In this white paper, discover how you can allow your employees to use file synchronization without putting your data at risk.
Posted: 25 Jun 2015 | Published: 31 Dec 2014

Varonis

Understanding Data Protection Regulations in the US
sponsored by Varonis
WHITE PAPER: This white paper outlines several important security regulations in the United States and gives advice on successfully meeting all of them.
Posted: 25 Jun 2015 | Published: 31 Dec 2014

Varonis

Privacy Compliance Strategies from Leading Records Management Professionals
sponsored by IntraLinks, Inc
EGUIDE: This expert e-guide explores records and information management (RIM) professionals, and their likelihood to play a big role as businesses place increasing importance on privacy compliance. Uncover an interview with RIM expert John Isaza for insights on developing these programs.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

IntraLinks, Inc

Top Five Things to Look for in Software-Defined Storage
sponsored by IBM
WHITE PAPER: This informative white paper reveals the top 5 things to look for in an SDS solution and SDS provider.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

IBM

The Peripheral You're Not Managing, and The Risk It Poses
sponsored by Nuance
WEBCAST: This webcast discusses the hidden security risk multi-function printers and other devices pose and gives advice for mitigating that risk.
Posted: 25 Jun 2015 | Premiered: Jun 9, 2015

Nuance

NetApp AltaVault Cloud-Integrated Storage
sponsored by NetApp
WHITE PAPER: This solution brief highlights a particular type of storage that enables customers to securely back up data to any cloud at up to 90% less cost compared to on-premises solutions.
Posted: 25 Jun 2015 | Published: 18 Jun 2015

NetApp

Tips For Securing Cloud-Based ECM And Enterprise Collaboration Tools
sponsored by IntraLinks, Inc
EGUIDE: This e-guide explores how companies can use enterprise collaboration tools to brainstorm ideas in a secure, recordable fashion. Join Forrester's Rob Koplowitz as he explains adoption trends for compliant technological teamwork, and learn the competitive potential of deploying sooner than later.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

IntraLinks, Inc

Into the Breach: Lessons from Real Security Incidents
sponsored by Varonis
WHITE PAPER: This white paper outlines three devastating security breaches from start to finish, helping you to learn from the mistakes of these compromised businesses and to better keep yourself safe.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Varonis
151 - 175 of 2283 Matches Previous Page    5 6 7 8 9 10    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement