IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
176 - 200 of 2266 Matches Previous Page  |  Next Page
Mobile Worker Privacy Survey
sponsored by OptioLabs
WHITE PAPER: This survey report examines how mobile workers perceive the risks associated with using sensitive data in public places and how they go about mitigating those risks.
Posted: 10 Dec 2015 | Published: 31 Dec 2012

OptioLabs

Proactive Incident Response: Prepare Now or Pay Later
sponsored by Blue Coat Systems
WHITE PAPER: This infographic features a proactive approach to incident response. Discover how to gain visibility and reduce response time by recording and analyzing all network traffic, earning you up to 55% in savings by reducing costs associated with data breaches.
Posted: 09 Dec 2015 | Published: 09 Dec 2015

Blue Coat Systems

Mobility Brings New Ways to Tackle IT Security Threats
sponsored by IBM
EGUIDE: This expert e-guide examines the security benefits of mobile app management (MAM), mobile content management (MCM), and identity and access management (IAM). View now to learn how these three mobile security approaches allow entitled access to the allocated resources while blocking malicious threats and users.
Posted: 09 Dec 2015 | Published: 02 Dec 2015

IBM

Government Worker Privacy Survey
sponsored by OptioLabs
WHITE PAPER: This survey report discusses the risks government agencies face when sensitive information is clearly displayed on a computer screen and gives suggestions for mitigating those risks.
Posted: 09 Dec 2015 | Published: 09 Dec 2015

OptioLabs

A Closer Look At Primary Storage Clouds and Cloud for Backup
sponsored by Carbonite
EGUIDE: Access this e-guide to get a closer look at the differences between backup and storage clouds, and also to learn about the pros and cons of cloud-based backup.
Posted: 09 Dec 2015 | Published: 23 Apr 2015

Carbonite

Improve Your Data Protection With a Backup Service Provider
sponsored by Carbonite
VIDEO: This webcast highlights the benefits of partnering with a backup service provider. Watch now to see how Carbonite can help improve your business continuity by providing you with the services you need for reliable data protection and backup.
Posted: 08 Dec 2015 | Premiered: 11 Aug 2015

Carbonite

New Technology Transforms Backup Data From a Static 'Insurance Policy' Into a Business Asset
sponsored by Cohesity
ANALYST REPORT: This analyst report explores the backup technology market, focusing on Cohesity's commitment to improving their data protection and backup technology. Access now to learn how Cohesity plans to eliminate the need for traditional backup/recovery software by converging virtually all data protection functions into one system.
Posted: 08 Dec 2015 | Published: 08 Jul 2015

Cohesity

Keep Your Patient Records Privacy
sponsored by OptioLabs
WHITE PAPER: This white paper explores the unique challenges of real-life data security and privacy in the healthcare industry. Read on to learn how you can keep all of your sensitive patient data private, even when it's displayed on a screen.
Posted: 08 Dec 2015 | Published: 08 Dec 2015

OptioLabs

Prevent Dangerous Insider Threats
sponsored by OptioLabs
WEBCAST: It only takes a casual glance over someone's shoulder for a malicious insider to steal the sensitive data on a trusted user's screen. This webcast explores this little-known "eavesdropper" threat and explains how you can combat it.
Posted: 08 Dec 2015 | Premiered: Dec 8, 2015

OptioLabs

Protect your Network with Effective Incident Response
sponsored by Blue Coat Systems
VIDEO: For a holistic view of security, organizations need effective incident response. Watch this videocast to find a demo on comprehensive network forensics.
Posted: 08 Dec 2015 | Premiered: 08 Dec 2015

Blue Coat Systems

Hybrid Disaster Recovery Solutions: Maintain Business as Usual Under Any Condition
sponsored by Carbonite
WHITE PAPER: This brief white paper overviews a disaster recovery solution engineered for the needs of SMBs. Read on to learn how this hybrid backup solution can improve your data protection and provide your enterprise with rapid recovery, flexibility, scalability, and more.
Posted: 08 Dec 2015 | Published: 08 Dec 2015

Carbonite

Enterprise Mobile Security for Dummies
sponsored by Skycure
WEBCAST: In this webcast, you'll gain insight into the confusing and evolving mobile security landscape. View now to learn a step-by-step guide to achieve holistic mobile security and review a checklist for evaluating mobile security strategies.
Posted: 07 Dec 2015 | Premiered: Mar 19, 2015

Skycure

Cybersecurity and Privacy Compliance: The Delicate Balance
sponsored by SearchCompliance.com
EBOOK: This handbook explores the challenges inherent in ensuring cybersecurity and maintaining user privacy, tackling the latest data governance strategies to find solutions that strike a balance between the two imperatives.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

SearchCompliance.com

Hybrid Cloud Storage Solution for Unstructured Data
sponsored by Microsoft
WHITE PAPER: This white paper highlights a hybrid cloud storage solution that addresses the complexities of unstructured data commonly associated with file shares. Access now to see how this solution can help you better manage the growth of your unstructured data.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

Microsoft

Insider Threats in the Real World
sponsored by OptioLabs
WHITE PAPER: This white paper introduces an approach to security that reduces the risk of real life insider threats, including eavesdropping, shoulder-surfing, credentials theft, and more.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

OptioLabs

Data Efficiency with Converged Secondary Storage
sponsored by Cohesity
ANALYST REPORT: This report highlights a data platform that works as a single, scalable appliance to protect your data and then use copies you already have to create snapshots for secondary uses. Access now to see how this platform can simplify your data management by eliminating the need for costly redundant data copies and redundant infrastructure silos.
Posted: 04 Dec 2015 | Published: 31 Oct 2015

Cohesity

Predictive Mobile Threat Defense
sponsored by Skycure
WHITE PAPER: This white paper explains the 3 reasons why traditional mobile security approaches can no longer protect users and organizations. Access this resource now to learn how to advance mobile security into a next-gen mobile threat defense to protect networks, apps, and users.
Posted: 03 Dec 2015 | Published: 11 Nov 2015

Skycure

Backup and Disaster Recovery: The IT Experience
sponsored by Carbonite
EBOOK: This eBook explores the impact of downtime and data loss on IT departments and offers a backup solution that can help meet your disaster recovery needs. Access now to see how this backup solution can provide your enterprise with better protection and faster recovery for all your business data.
Posted: 03 Dec 2015 | Published: 03 Dec 2015

Carbonite

Mobile Security – What Works and What Doesn’t?
sponsored by IBM
EGUIDE: Should your organization be more worried about mobile malware, or Wi-FI mast stations? Find out where the true mobile security dangers lie in this expert e-guide - as well as which defenses work to mitigate these threats.
Posted: 03 Dec 2015 | Published: 25 Nov 2015

IBM

Executive Summary: Proactive Response to Incident Response
sponsored by Blue Coat Systems
WHITE PAPER: This white paper describes how to find a solution that addresses two main drivers of incident response (IR) costs. Discover key strategies for lowering costs and maximizing ROI when performing IR, with details on three maturity models.
Posted: 03 Dec 2015 | Published: 30 Sep 2015

Blue Coat Systems

Data Privacy In The Cloud: Five Current Issues in Compliance
sponsored by OpenText
WHITE PAPER: This in-depth resource can help you navigate compliance laws around the world and adhere to even the most complex regulations in your cloud environment.
Posted: 03 Dec 2015 | Published: 31 May 2015

OpenText

It's Not You, It's Me: Understanding the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This white paper discusses why public cloud security is a shared responsibility and explains exactly what your role is when securing public cloud data.
Posted: 02 Dec 2015 | Published: 02 Dec 2015

Alert Logic

Swiss Army Knife Security? How to Vet Integrated Tool Sets
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at the changing delivery models for cybersecurity tools as more vendors offer multi-tool platforms and services. Let us help you make sense of it all with advice on tool consolidation.
Posted: 02 Dec 2015 | Published: 02 Dec 2015

SearchSecurity.com

When Policy and Productivity go Hand-in-Hand
sponsored by IBM
WHITE PAPER: Access this article and learn how to accommodate the new ways employees collaborate, while also maintaining a level of control and visibility over what corporate data can and cannot be shared with third-party cloud apps.
Posted: 01 Dec 2015 | Published: 22 Sep 2015

IBM

Automate PCI Compliance Monitoring, Investigation & Reporting
sponsored by AccelOps Inc.
WHITE PAPER: This helpful white paper outlines the 12 PCI DSS requirements a compliance automation strategy needs to fulfill and explores what features to look for when selecting an approach.
Posted: 01 Dec 2015 | Published: 13 Apr 2011

AccelOps Inc.
176 - 200 of 2266 Matches Previous Page    6 7 8 9 10 11    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement