IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
176 - 200 of 2593 Matches Previous Page  |  Next Page
As a DevOps Engineer, What Should I know about Security Tools?
sponsored by CyberArk Software, Inc
VIDEO: Watch this webcast to uncover what you should know about security tools and protection in order to properly secure your DevOps.
Posted: 20 Sep 2017 | Premiered: 20 Sep 2017

CyberArk Software, Inc

Defender Lifecycle Model
sponsored by Gigamon
RESOURCE: In this short solution brief, learn how the Defender Lifecycle Model can help network viability to automate and accelerate the identification of threats.
Posted: 19 Sep 2017 | Published: 31 Aug 2017

Gigamon

IT Security and the Devops Environment
sponsored by CyberArk Software, Inc
VIDEO: DevOps environments are unique because of the speed and scale at which they work. Watch this webcast to reveal characteristics regarding DevOps environments as well as the security aspects of DevOps.
Posted: 19 Sep 2017 | Premiered: 19 Sep 2017

CyberArk Software, Inc

How to Think like a Hacker to Stop Application Security Threats
sponsored by IBM
EGUIDE: Find out how applying the hacker mindset when setting application security standards can help uncover flaws that vulnerability scanners might not recognize.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

GDPR Primer for the C-Suite and Board of Directors
sponsored by CyberArk Software, Inc
WHITE PAPER: Take a closer look at this white paper to reveal what executives and board members need to know to prepare for the GDPR.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

CyberArk Software, Inc

Achieving a Unified Data Governance Strategy
sponsored by IBM
WHITE PAPER: Learn about recent updates to data governance and its key drivers, such as compliance, self-service analytics, big data, and data monetization.
Posted: 19 Sep 2017 | Published: 31 Jul 2017

IBM

A 5 Minute Guide to Cognitive Search for Customer Support
sponsored by Attivio, Inc.
WHITE PAPER: Explore the basics of a cognitive search platform – from natural language processing to robust security and big data analytics – and find out how cognitive search apps can help contact centers revitalize customer interactions and self-service.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

Attivio, Inc.

Data Protection Steps for Ransomware
sponsored by TechTarget
RESOURCE: Forrester Research predicts that ransomware attacks and privacy breaches will escalate in 2017. That means organizations without ransomware protection are taking a huge risk. Access our new guide, Two Quick Data Protection Steps for Ransomware, and find out why it's more important than ever to be proactive in the fight against this epidemic.
Posted: 18 Sep 2017 | Published: 03 Apr 2017

TechTarget

Five Risk Points To Avoid In Enterprise Security
sponsored by Microsoft
RESOURCE: In this white paper, guide yourself through the 5 step course to detect and prevent advance cyberattacks.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

Microsoft

Automate Log Management to Meet NIST 800-53 Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST 800-53 requirements. Explore how a log management and analysis platform can help your company meet or exceed these guidelines.
Posted: 15 Sep 2017 | Published: 31 Dec 2014

LogRhythm, Inc.

Top Trends Impacting IAM
sponsored by Simeio
WEBCAST: Watch this webcast to learn how to 'win' in cybersecurity as well as prepare for the future of identity and access management.
Posted: 15 Sep 2017 | Premiered: Sep 14, 2017

Simeio

7 Key Considerations When Replacing Legacy Search
sponsored by Attivio, Inc.
EBOOK: Whether your employees simply aren't getting the results they need from your search app or you're looking to update your legacy search software, uncover 7 critical elements to consider when replacing your search app.
Posted: 14 Sep 2017 | Published: 14 Sep 2017

Attivio, Inc.

A 5 Minute Guide to Security for Cognitive Search and Knowledge Management
sponsored by Attivio, Inc.
WHITE PAPER: Examine the resurgence of knowledge management, in conjunction with cognitive search and security, as a viable option for coordinating the vast amounts of information buried in big data environments.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

Attivio, Inc.

Focus: Datacentre Uptime
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we take a closer look at some high-profile datacentre outages of recent times and assess the toll they took on the companies involved, and look into what providers and consumers can do to protect themselves from downtime.
Posted: 12 Sep 2017 | Published: 12 Sep 2017

ComputerWeekly.com

Get Your Company GDPR-Ready: Research Study Results
sponsored by CA Technologies.
WEBCAST: The General Data Protection Regulation (GDPR) is bringing new rules and penalties for the misuse or loss of personal data. Explore the results of this Vanson Bourne research study to learn about the impacts of the GDPR, steps you can take to ready your company, enterprises' plans to purchase tools and adopt new data strategies, and more.
Posted: 12 Sep 2017 | Premiered: Sep 6, 2017, 01:01 EDT (05:01 GMT)

CA Technologies.

GDPR: The State of Play
sponsored by ComputerWeekly.com
DATA SHEET: An infographic to inform the reader of what GDPR is, how it will affect them, and when it will come into play.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

ComputerWeekly.com

GDPR Compliance: The Implications for Test Data Management
sponsored by CA Technologies.
WHITE PAPER: Learn about the key implications of GDPR regulations for test data management and explore topics like data masking, synthetic data generation, and more.
Posted: 11 Sep 2017 | Published: 31 Dec 2016

CA Technologies.

Ready, Set, Go: General Data Protection Regulation (GDPR)
sponsored by CA Technologies.
WEBCAST: With the General Data Protection Regulation (GDPR) looming in the very near future, it's extremely important to know what it is, how you can comply, and how it may affect you. In this webinar, explore recommendations by CA Technologies that can help you prepare for the GDPR's arrival.
Posted: 11 Sep 2017 | Premiered: Sep 6, 2017

CA Technologies.

What Does The GDPR Mean To You? How To Improve Your Testing And Keep Your Test Data Compliant
sponsored by CA Technologies.
WEBCAST: Data breaches are almost an everyday event – but the upcoming General Data Protection Regulation (GDPR) forces you to think differently about data breaches and how they impact your software development and testing process. Learn what you can do to avoid compromising your test data, and how CA Test Data Manager can help.
Posted: 11 Sep 2017 | Premiered: Sep 6, 2017

CA Technologies.

GDPR Compliance: How Can You Adapt to the New Regulation?
sponsored by CA Technologies.
WHITE PAPER: The General Data Protection Regulation (GDPR) is set to begin in May 2018 – is your organization ready to comply? Learn from a technology perspective what's needed to comply with the GDPR. Topics covered include data breach reporting, accountability, rights and more.
Posted: 08 Sep 2017 | Published: 08 Sep 2017

CA Technologies.

GDPR Is A State of Mind: Research Report
sponsored by CA Technologies.
RESEARCH CONTENT: The European General Data Protection Regulation (GDPR) is coming – fast. In this Computing Research report, learn how 115 UK business decision-makers in large enterprises feel about the upcoming GDPR and how these concerns relate to everyday issues of storage, security and software development.
Posted: 08 Sep 2017 | Published: 01 Jun 2017

CA Technologies.

Enterprise-class Big Data for Data Analytics
sponsored by Virtustream
WHITE PAPER: Big data has been a big mystery for a long time, but the fog is starting to lift. In this white paper, you will find everything you need to use the cloud to leverage big data.
Posted: 08 Sep 2017 | Published: 08 Sep 2017

Virtustream

CW Europe – September-November 2017
sponsored by ComputerWeekly.com
EZINE: In this quarter's CW Europe, read about a political crisis in Balkan state with tech at its centre. The country has been accused of using surveillance technology for covert spying. Protests related to this were instrumental in the ruling party losing power after 10 years.
Posted: 07 Sep 2017 | Published: 07 Sep 2017

ComputerWeekly.com

Step Up Your Security and Privacy with Data Masking
sponsored by Delphix
WEBCAST: For many organizations, the most confidential information exists in some of the least-secure environments. Learn why data masking is an effective approach to protecting sensitive environments from a variety of threats. Discover challenges and best practices for implementing data-masking tools, and more.
Posted: 07 Sep 2017 | Premiered: Aug 28, 2017

Delphix

EU GDPR Compliance Puts Focus on Data Tracking, Encryption
sponsored by Ivanti
EGUIDE: In this e-guide, experts explain why data tracking, encryption and other measures are crucial for GDPR compliance.
Posted: 05 Sep 2017 | Published: 31 Aug 2017

Ivanti
176 - 200 of 2593 Matches Previous Page    6 7 8 9 10 11    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement