IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
151 - 175 of 2615 Matches Previous Page  |  Next Page
Security at Scale: Governance in AWS
sponsored by Amazon Web Services
WHITE PAPER: Access this white paper to explore the security and governance features built into AWS services that enable you to incorporate security benefits and best practices in building your integrated environment with AWS.
Posted: 09 Oct 2017 | Published: 30 Oct 2015

Amazon Web Services

Secure Content Delivery with Amazon CloudFront
sponsored by Amazon Web Services
WHITE PAPER: As companies respond to cybercrime, compliance requirements, and a commitment to securing customer data, their adoption of SSLs and TLSs increases. Gain insight into how you can improve the security and performance of your APIs and applications (hint: Amazon CloudFront) while lowering your content delivery costs.
Posted: 09 Oct 2017 | Published: 30 Nov 2016

Amazon Web Services

Architecting for HIPAA Security and Compliance on Amazon Web Services
sponsored by Amazon Web Services
WHITE PAPER: AWS customers with HIPAA compliance requirements have a great deal of flexibility in how they meet encryption requirements for PHI. In this white paper, uncover HIPAA privacy and security rules and learn techniques for meeting compliance requirements.
Posted: 09 Oct 2017 | Published: 30 Sep 2017

Amazon Web Services

AWS Key Management Service Best Practices
sponsored by Amazon Web Services
WHITE PAPER: This white paper details how you can use the AWS Key Management Service to protect sensitive information across 5 core areas, including identity and access management, detective control, and more.
Posted: 09 Oct 2017 | Published: 30 Apr 2017

Amazon Web Services

SAP HANA and IBM Power Systems: Better Together
sponsored by EOH IBM
RESOURCE: If you're looking to accelerate your ability to leverage SAP data and generate real-time insights, you may want to consider examining the servers that support your key apps and databases like SAP HANA. Learn about IBM Power Systems and how they measure up when compared to traditional x86-based servers.
Posted: 09 Oct 2017 | Published: 09 Oct 2017

EOH IBM

Meet Compliance Regulations for Long-Term Record Management
sponsored by Arkivum
PRODUCT OVERVIEW: Organizations in the life sciences, pharmaceutical and health markets need to meet strict regulations for data lifecycle and long-term record management. Explore this brief tech overview to uncover the benefits of digital archiving in the healthcare industry.
Posted: 09 Oct 2017 | Published: 09 Oct 2017

Arkivum

Preparing for the Big One: General Data Protection Regulation
sponsored by Smarsh
WHITE PAPER: Even if your organization is not physically located in the EU, the GDPR will most likely affect you as well. In this white paper, gain insight into GDPR requirements and what your organization must do to comply.
Posted: 09 Oct 2017 | Published: 09 Oct 2017

Smarsh

Case Study: Efficiently Archiving Electronic Clinical Trial Data
sponsored by Arkivum
CASE STUDY: The electronic archiving of clinical trial data is a regulatory requirement for many authorities. This case study explores how a Japanese top 10 pharmaceutical company leveraged a long-term e-archiving strategy to manage millions of pages from clinical trials.
Posted: 09 Oct 2017 | Published: 09 Oct 2017

Arkivum

A Practical Guide for GDPR Compliance
sponsored by Smarsh
WHITE PAPER: GDPR is coming fast and complying with the regulation is not optional. In this research report, discover why GDPR is important, the essential requirements of it, and a checklist for GDPR compliance.
Posted: 06 Oct 2017 | Published: 31 Jul 2017

Smarsh

Harnessing the Potential of SAP HANA with IBM Power Systems
sponsored by EOH IBM
EBOOK: Discover how you can increase the flexibility of your SAP HANA deployment to capitalize on its disruptive potential and get the facts about IBM's Power Systems.
Posted: 05 Oct 2017 | Published: 05 Oct 2017

EOH IBM

Information Lifecycle Management: Harness The Power Of Your Data
sponsored by Cintra
WHITE PAPER: Discover how to create a comprehensive information lifecycle management (ILM) strategy. Find out how to take a 4 tiered approach to categorizing and managing your data and learn about the key pillars of ILM.
Posted: 05 Oct 2017 | Published: 31 Dec 2016

Cintra

The Top 5 Myths of Data Breaches
sponsored by FireMon
WHITE PAPER: Debunking myths is an important step to improve the effectiveness of security defenses against future breach attempts. This white paper discloses who and what is at risk of a data breach and reveals the top 5 myths of data breaches.
Posted: 04 Oct 2017 | Published: 04 Oct 2017

FireMon

Protecting Data After the Digital Disruption
sponsored by Proofpoint, Inc.
WEBCAST: Data is no longer stored in one location and companies are running into challenges related to securing sensitive data. Watch this webcast to uncover key challenges driving DLP as well as stages of DLP maturity, considerations for your DLP strategy, and more.
Posted: 04 Oct 2017 | Premiered: Oct 4, 2017

Proofpoint, Inc.

Empowering IT with Distributed Capture Scanner Technology
sponsored by Kodak Alaris
WHITE PAPER: Take the next step on your digital transformation journey and discover how distributed capture technology can help IT departments ensure a fast, secure flow of data through the enterprise, improve user experiences, manage unstructured data volumes, and accelerate document management.
Posted: 04 Oct 2017 | Published: 31 Aug 2016

Kodak Alaris

Best Practices of Third-Party Software Security
sponsored by Veracode, Inc.
WHITE PAPER: This white paper offers best practices for improving software security across your entire application landscape. Uncover best practices and approaches for securing third-party applications, open source components, and outsourced code.
Posted: 04 Oct 2017 | Published: 04 Oct 2017

Veracode, Inc.

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: In a recent Verizon study, there were 2,260 confirmed data breaches in 82 countries with 40% resulting directly from web app attacks. Gain a deeper understanding about app security and uncover 3 steps to reach AppSec maturity.
Posted: 04 Oct 2017 | Published: 04 Oct 2017

Veracode, Inc.

From the Top: What Executives Need to Know About Cybersecurity
sponsored by Kaspersky Lab
WHITE PAPER: $117,000 is the average financial impact of a data breach for SMBs in North America and $1.3 million is the average impact for a large enterprise in North America. This paper identifies 6 myths about enterprise security to help you strengthen your approach, so you do not fall victim to data breach's large financial impact.
Posted: 04 Oct 2017 | Published: 04 Oct 2017

Kaspersky Lab

Top 3 Ways HyperScale for OpenStack Protects your Applications and Data
sponsored by Veritas
WHITE PAPER: Ensuring adequate data protection is critical before placing workloads (and the corresponding data that they operate upon) into production. This tip sheet outlines the 3 ways in which Veritas HyperScale for OpenStack keeps your applications and data safe.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Veritas

Leveraging a Revolutionary Software-Defined Storage Architecture for OpenStack-Based Clouds
sponsored by Veritas
WHITE PAPER: Enterprises are adopting private clouds to meet business demands, address competitive pressures and realize benefits such as cost-effectiveness and agility. Veritas HyperScale for OpenStack employs a new architecture that uses direct attached storage and divides the storage functionality across two separate planes. Read on to learn more.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Veritas

IT Security: Cost Center or Strategic Investment?
sponsored by Kaspersky Lab
WHITE PAPER: Understanding the math behind the cost of a cyberattack is more crucial now than ever. By reading this white paper, gain a deeper understanding of the cost of IT security incidents and how to move your organization forward in preventing data breaches.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Kaspersky Lab

The Human Factor in IT Security: How Employees Are Making Businesses Vulnerable from Within
sponsored by Kaspersky Lab
WHITE PAPER: 52% of businesses admit that employees are their biggest weakness in IT security, with their careless actions putting data and networks at risk. In this white paper gain insight into how to address the "human factor" dilemma and eliminate employee irresponsibility by following the right steps forward.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Kaspersky Lab

Steps to Protect Your Growing Data
sponsored by SearchSecurity.com
EZINE: The distribution of data and the many ways in which it can be accessed has made handling data protection risks especially challenging. In this issue of Information Security, security experts examine data protection risks and considerations for implementing a data - centric security model.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

SearchSecurity.com

Lightning Speed: Getting to the Cloud Faster
sponsored by Commvault
WHITE PAPER: You need to get your organization into the cloud before your employees start doing it on their own, creating a shadow IT nightmare. Access this white paper to learn how to get to the cloud faster than your employees can put your organization at risk.
Posted: 02 Oct 2017 | Published: 31 Dec 2015

Commvault

Cloud Data Management: Enabling Hybrid IT Infrastructure
sponsored by Commvault
VIDEO: Moving to the cloud has its advantages, but you cannot rush the process when it comes to securely moving and managing your data. Take 1 minute to learn how intelligent hybrid IT can move your data efficiently, securely, and enable access to data when you need it.
Posted: 02 Oct 2017 | Premiered: 26 May 2017

Commvault

11 Things Every Organization Needs to Know When Migrating Oracle Apps to the Cloud
sponsored by Cintra
WHITE PAPER: While Oracle's cloud is engineered to work with your Oracle apps and databases, it isn't simply a case of shifting exactly what you've got on-premise to the cloud. Discover 11 things you need to consider as you plan your Oracle cloud migration.
Posted: 02 Oct 2017 | Published: 31 Dec 2016

Cintra
151 - 175 of 2615 Matches Previous Page    5 6 7 8 9 10    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement