IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
151 - 175 of 2351 Matches Previous Page  |  Next Page
Breaking Down the Main Barriers to Cloud Backup
sponsored by Dimension Data
WHITE PAPER: Access this white paper to learn about the barriers that IT leaders have to overcome when considering the management of data backup within cloud storage. Read on to see what your enterprise should take into account if you are considering cloud for your data management.
Posted: 06 Oct 2015 | Published: 28 Sep 2015

Dimension Data

Trusted Computing in a Hybrid Cloud Environment
sponsored by Intel and IBM
WEBCAST: In this extensive webcast, learn the 4 challenging questions consumers ask when considering a cloud migration, and how to lay their fears to rest that their data will remain safe. View now to learn how to remain compliant with data privacy laws when data is moved to the cloud.
Posted: 05 Oct 2015 | Premiered: Jun 11, 2015

Intel and IBM

WAF Enables Cloud and Hosting Providers to Bolster Security Offerings
sponsored by Radware
WHITE PAPER: In this white paper, explore how cloud and hosting providers can improve security to attract more customers, improve per-customer revenue, and increase loyalty. Continue reading to learn the top 3 web app security challenges and how to put customers' minds at ease.
Posted: 05 Oct 2015 | Published: 31 Oct 2012


The Role of Third-Party Tools for Office 365 Compliance
sponsored by Smarsh
WHITE PAPER: This white paper explores the challenges of keeping Office 365 in regulatory compliance for your enterprise. Access now to see how you can keep your enterprise up on all of your auditing and reporting requirements.
Posted: 05 Oct 2015 | Published: 15 Sep 2015


Case Study: Sharing Files without Compromising Security
sponsored by FinalCode
WHITE PAPER: In this case study, discover how an electrical service organization obtained quick and easy file-sharing that didn't compromise its security.
Posted: 05 Oct 2015 | Published: 30 Apr 2015


Secure, Efficient File-Sharing
sponsored by FinalCode
VIDEO: This brief video looks at a security system that keeps files safe without altering the way employees share them.
Posted: 05 Oct 2015 | Premiered: 29 May 2015


The Cloud App Visibility Blind Spot
sponsored by Imperva
WHITE PAPER: This white paper covers the significant blindspot in visibility and increased risks for organizations in the face of "Shadow IT". In addition, this paper covers why traditional controls that secure your on-premise environment don't provide the required visibility into user activity and risks related to cloud app use.
Posted: 05 Oct 2015 | Published: 30 Sep 2015


Top 10 Database Security Threats
sponsored by Imperva
WHITE PAPER: Practical applications for Big Data have become widespread, and Big Data has now become the new "prize" for hackers. This whitepaper explains common injection points that provide an avenue for attackers to maliciously access database and Big Data components.
Posted: 05 Oct 2015 | Published: 31 Dec 2014


DLP Benefits for Enterprises and Intellectual Property Protection
sponsored by Digital Guardian
EGUIDE: This e-guide addresses some of the challenges posed by data security, with a special focus on data classification and data loss prevention.
Posted: 05 Oct 2015 | Published: 05 Oct 2015

Digital Guardian

Why InfoSec Needs Guarantees
sponsored by WhiteHat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 01 Oct 2015 | Premiered: May 12, 2015

WhiteHat Security

Best Practices for Web Application Security
sponsored by WhiteHat Security
EGUIDE: Access this exclusive e-guide to discover tips for tackling web application security through software development. Learn how to review your Web application security assessment tools and develop a strategy.
Posted: 01 Oct 2015 | Published: 06 May 2015

WhiteHat Security

An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 01 Oct 2015 | Premiered: Jul 1, 2015

WhiteHat Security

Programmatically Identifying Multi-Page Flaws in Web Apps
sponsored by WhiteHat Security
WHITE PAPER: This white paper details the pros and cons of several web app scanning approaches. View now to test your web apps' functions independently, automatically detect the presence of common nonce frameworks, and more.
Posted: 01 Oct 2015 | Published: 31 Dec 2013

WhiteHat Security

Evaluating the Total Cost of Ownership for Protecting Web Applications
sponsored by WhiteHat Security
WHITE PAPER: This white paper breaks down the total cost of web app security in the three major risk categories associated with successful attacks. Access now to learn how to quantify the costs of web app security compared to the costs of a breach.
Posted: 01 Oct 2015 | Published: 14 Oct 2013

WhiteHat Security

Gaining Visibility, Meaningful Information Security, and Fraud Data in Seconds
sponsored by WhiteHat Security
WHITE PAPER: In this white paper, you'll discover how to use big data for InfoSec and fraud analytics to strengthen your security strategy.
Posted: 01 Oct 2015 | Published: 18 Dec 2014

WhiteHat Security

Enterprise Security in Asia 2015: The Ugly, The Bad & The Good
sponsored by F5 Networks
WHITE PAPER: This white paper reveals the truth about cybersecurity in Asia including a 52% surge in breaches and the emerging sophisticated schemes from hackers. View now to learn which attacks are most popular and how to avoid being the next data breach victim.
Posted: 01 Oct 2015 | Published: 13 Jan 2015

F5 Networks

Cloud Security: Expand Your Cloud Offering and Protect Your Services
sponsored by Radware
WHITE PAPER: This white paper examines the unique security challenges CSPs are up against and how to protect your organization's infrastructure from advanced threats.
Posted: 01 Oct 2015 | Published: 05 Jan 2012


CW Europe – October 2015
sponsored by
EZINE: Cloud computing has huge benefits to businesses and individual. The ability to deliver services to any location that has an internet connection and a suitable device empowers people.
Posted: 01 Oct 2015 | Published: 01 Oct 2015

Case Study: TSG Redefines Cloud Backup
sponsored by Commvault
CASE STUDY: This case study exhibits one managed service provider's quest to implementing a backup and recovery system that would seamlessly fit into their technology and pricing model. Read on to see how an efficient platform can accommodate your data protection needs.
Posted: 30 Sep 2015 | Published: 30 Sep 2015


An Innovative Approach to Encrypted Network Security
sponsored by Unisys
VIDEO: This video introduces a new kind of encryption that keeps data on your network and mobile devices more secure while allowing for simple endpoint management and access.
Posted: 30 Sep 2015 | Premiered: 11 Sep 2015


Four Essential Fundamentals to Increasing Agility in the Cloud
sponsored by Commvault
WHITE PAPER: Access this white paper to learn about the 4 key elements that should be implemented to help your enterprise efficiently manage data protection and recovery operations. Read on to see how you can achieve a single point of control for both your on-premise and cloud-based data and improve your overall data protection.
Posted: 30 Sep 2015 | Published: 30 Sep 2015


Delivering a New Level of Data Protection Resiliency with Appliances
sponsored by Symantec Corporation
WHITE PAPER: This white paper outlines the 4 crucial characteristics of resilient backups. Read on to learn how you can ensure the availability of your data as well as strategies to prevent and manage downtime.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

Symantec Corporation

5 Steps to Migrate Your Applications to the Cloud Stress Free
sponsored by Commvault
WHITE PAPER: In this white paper, you'll find a five-step process for securely migrating your applications to the cloud and keeping them secure once they're there.
Posted: 29 Sep 2015 | Published: 29 Sep 2015


Bringing E-Discovery In-House: Risks and Rewards
sponsored by Zylab International, Inc.
WHITE PAPER: This white paper provides a straightforward, pragmatic overview about how legal professionals and organizations confronted with eDiscovery must be able to interpret it within the context of processes, risks, and viable strategies.
Posted: 29 Sep 2015 | Published: 30 Dec 2011

Zylab International, Inc.

Boost Protection Against Targeted Attacks with Sandboxing
sponsored by Trend Micro
WHITE PAPER: In this white paper, examine how sandboxing uncovers these hidden malware attacks by executing them in a secure and isolated environment.
Posted: 29 Sep 2015 | Published: 26 Aug 2015

Trend Micro
151 - 175 of 2351 Matches Previous Page    5 6 7 8 9 10    Next Page
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement