IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
176 - 200 of 2633 Matches Previous Page  |  Next Page
Clearing the Confusion of Modern Data Protection
sponsored by IBM
WEBCAST: One aspect of IT that everyone agrees upon is the need for better data protection. But what they don't always agree on is how to provide it. View this webcast where Jason Buffington, senior analyst at ESG, takes an in-depth look at modern data protection and explains why when you modernize production, you must modernize protection.
Posted: 26 Aug 2016 | Premiered: Jan 7, 2016


IDaaS: Modernize Your IAM in the Cloud
sponsored by OneLogin
WEBCAST: Learn how identity management as a service (IDaaS) can help you modernize your IAM and roll out applications as quickly as possible while ensuring your data is kept secure.
Posted: 25 Aug 2016 | Premiered: Jul 12, 2016


5 Ways to Safeguard Sensitive Data from Insider Threats and External Attacks
sponsored by IBM
WHITE PAPER: A modular security strategy that allows you to deploy defense capabilities as you need them is the key to future protection. Discover how you can monitor your entire network continuously to prevent the 5 most harmful occurrences.
Posted: 25 Aug 2016 | Published: 01 Nov 2015


Uncovering the Risk of SAP Cyber Breaches
sponsored by Onapsis
WHITE PAPER: The purpose of this Ponemon Institue study is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.
Posted: 25 Aug 2016 | Published: 01 Jul 2016


Threat Report: Exploitation & Cyberattacks on SAP Business Applications
sponsored by Onapsis
WHITE PAPER: Your SAP applications are under attack. Access this in-depth threat report to learn about a specific vulnerability being actively exploited, the types of SAP systems affected, and how you can mitigate this vulnerability to minimize business risk.
Posted: 25 Aug 2016 | Published: 01 Jul 2016


Protecting Critical Data in Virtual Environments
sponsored by IBM
WHITE PAPER: VMware and Hyper-V admins need to know their data is properly protected, but requirements vary widely, with some VMs managing little or no data and others hosting core business applications. Access this paper to automate data protection for all VM and server environments, and adjust protection as needed.
Posted: 25 Aug 2016 | Published: 31 Dec 2015


How Hacking Happens in 2016: Account Takeover
sponsored by IMMUNIO, Inc.
WHITE PAPER: Account takeovers are the latest tricks up the sleeves of hackers, and this e-book helps you understand the 4 main techniques that hackers use to target the accounts of your users. Access now to learn how you can prevent account takeover, and even quickly detect compromised accounts.
Posted: 25 Aug 2016 | Published: 01 Jul 2016


Simplifying the Complexity of the Internet of Things
sponsored by Xively by LogMeIn
RESEARCH CONTENT: To understand exactly what it takes to create strong IoT-enabled products and engage customers, Forrester conducted research into the key priorities and objects of 232 manufacturers. Access this report to explore their 4 key findings about product differentiation, device management, IoT data analysis, and support.
Posted: 25 Aug 2016 | Published: 30 Jun 2016

Xively by LogMeIn

Inside Job: A Better Strategy to Stop Insider Threats
sponsored by Infor
WHITE PAPER: Insider threats are the greatest risk to top-of-the-line cybersecurity. Your data and predictive analytics may be the best tools to protect against insider threats. This guide to insider threats walks you through a brief history of these threats, who could be considered insiders, and how to approach these issues now as well as in the future.
Posted: 24 Aug 2016 | Published: 31 Dec 2015


Manage Risk by Protecting Apps, Data and Usage
sponsored by Citrix
WHITE PAPER: When it comes to securing vulnerabilities, especially in apps, there are 5 best practices you can follow. This white paper provides and overview of how to ensure privacy, protect sensitive information and enable compliance of apps and data without compromising workforce flexibility and productivity.
Posted: 24 Aug 2016 | Published: 31 Dec 2015


Strategy Guide for Securing the SAP Landscape
sponsored by Onapsis
WHITE PAPER: Your organization should be thinking about how best to protect SAP systems. Learn how to secure SAP by taking a largely application-oriented approach, while also applying network restrictions to underlying network devices and firewalls.
Posted: 24 Aug 2016 | Published: 01 Jun 2016


Can Your DR Strategy Ensure Continuity in Quality Patient Care During a Disaster?
sponsored by McKesson Corporation
WHITE PAPER: Explore the 5 critical pieces of a successful healthcare disaster recovery plan, and discover the best way to ensure your patients have uninterrupted quality care in the event of a disaster.
Posted: 23 Aug 2016 | Published: 23 Aug 2016

McKesson Corporation

Best Practices for Healthcare IT Disaster Recovery in the New Threat Landscape
sponsored by McKesson Corporation
WHITE PAPER: Explore expert best practices for implementing a reliable and effective disaster recovery and business continuity strategy in a healthcare organization to ensure critical patient data and systems are safe and accessible when disaster strikes.
Posted: 23 Aug 2016 | Published: 23 Aug 2016

McKesson Corporation

Protect and Recovery Data with Confidence
sponsored by IBM
PRODUCT DEMO: This demonstration tool provides an at-a-glance summary of how IBM Spectrum Protect monitors and protects your backup data. See how this tool can provide your enterprise with the ability to see your data protection world in a single view, confidence that your business will continue in event of a disaster, and more.
Posted: 23 Aug 2016 | Premiered: 23 Aug 2016


Above Security Delivers Customer Value
sponsored by Above Security
WEBCAST: It's imperative your security vendor understands your organization's tools and services to best produce services catered to your needs. They must own your issues - take them on as their own to establish the strong relationship critical for strong security control. This short webinar shows you how to achieve these things and much more.
Posted: 23 Aug 2016 | Premiered: Jun 3, 2016

Above Security

Day in the Life of a Security Admin
sponsored by RSA Softcat
WHITE PAPER: It's now easier than ever to allow users full access to all network tools and data with a single username and password combination. Learn how to set precise security requirements for each application for any user, from anywhere, to anything.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

RSA Softcat

Onapsis Research Labs: SAP Systems Security Analysis
sponsored by Onapsis
WHITE PAPER: This Onapsis Research Labs report helps you frame the business risk of an SAP cyberattack by examining your SAP application layer for known vulnerabilities.
Posted: 22 Aug 2016 | Published: 29 Feb 2016


Five Ways to Secure Mobile Data with EMM
sponsored by Hewlett Packard Enterprise
EGUIDE: For most organizations it's a matter of when, not if, their data will be attacked. But enterprise mobility management (EMM) tools can help keep mobile data secure. This e-guide details five ways to secure mobile data with EMM.
Posted: 22 Aug 2016 | Published: 19 Aug 2016

Hewlett Packard Enterprise

Removing the Risk from Compliance in the Cloud
sponsored by VMware
WHITE PAPER: Learn how to mitigate cloud security compliance concerns by aligning with the right cloud service provider. Discover how to ensure responsibilities are shared for meeting compliance and security requirements and maintain a stringent information security policy.
Posted: 19 Aug 2016 | Published: 01 Jul 2016


Ease Backup Woes with Cost-Efficient Data Archiving
sponsored by Rubrik
EGUIDE: George Crump, President of Storage Switzerland, highlights how a modern data archiving solution can dramatically reduce the amount of data that needs to be backed up and managed on a daily basis. Read on and discover multiple data archiving storage and software solutions that can save your enterprise money and ease backup issues.
Posted: 19 Aug 2016 | Published: 17 Aug 2016


Information Security and Data Privacy Practices
sponsored by Gigya
WHITE PAPER: Explore several information security and data privacy practices that will enable you to better protect your data. Topics discussed include infrastructure, data security, compliance, privacy, and more.
Posted: 18 Aug 2016 | Published: 29 Jul 2016


Advanced Persistent Threats and the Case for a Security Intelligence and Response Program
sponsored by Above Security
WHITE PAPER: Get a general overview of advanced persistent threats (APTs) and who needs to be concerned about their malicious activities within this white paper. Access now to fully realize the benefit of security improvements, situational awareness, and a security intelligence lifecycle.
Posted: 17 Aug 2016 | Published: 01 Jul 2016

Above Security

How One Company Integrated Its Infrastructure with Hadoop
sponsored by Intel Corporation
WHITE PAPER: Learn about how one company that used the Kafka Messaging tool with Hadoop to extend its data integration architecture to incorporate big data in real time. Discover how the company was able to improve customer services, security, and data management, and how you can do the same.
Posted: 24 Aug 2016 | Published: 29 Apr 2016

Intel Corporation

From Data to Action: Your Guide to Analytics
sponsored by Intel Corporation
ANALYST REPORT: You've followed the big data trend and collected more data than you may need—now what? In this comprehensive guide to analytics, learn everything from using data to propel your business forward, to extracting value from almost any analytics project, to securing big data.
Posted: 24 Aug 2016 | Published: 31 Dec 2015

Intel Corporation

Big Data: Securing Apache Hadoop Platform
sponsored by Intel Corporation
WHITE PAPER: While Hadoop does wonders for data management, it was not designed with security in mind. Read about Hadoop security challenges and discover 6 ways to improve Hadoop security. Find out where the balance lies between security and big data flow.
Posted: 24 Aug 2016 | Published: 30 Jun 2016

Intel Corporation
176 - 200 of 2633 Matches Previous Page    6 7 8 9 10 11    Next Page
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement