IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
176 - 200 of 2686 Matches Previous Page  |  Next Page
Cloud Backup and Disaster Recovery: Keep Your Business Up and Running
sponsored by Iron Mountain
WHITE PAPER: This brief white paper highlights a cloud data protection solution that provides automatic secure cloud backup and fail-proof recovery services. Access now to discover how you can benefit from a solution that keeps your business up and running with your data safe and secure.
Posted: 06 May 2016 | Published: 31 Jan 2016

Iron Mountain

Micro-Segmentation Builds Security Into Your Data Center’s DNA
sponsored by VMware
WHITE PAPER: Micro-segmentation is an adaptive technology that narrows your data center security's focus to overcome threats faster than ever. Access this white paper to learn more about the security and protection micro-segmentation will provide your data center.
Posted: 06 May 2016 | Published: 27 Apr 2016

VMware

How Sarbanes-Oxley Act (SOX) Compliance is Impossible without Privileged Management
sponsored by Dell Software
WHITE PAPER: This white paper addresses IT security compliance from an auditor's perspective. Access now to help your organization achieve and prove compliance with other security mandates as well.
Posted: 06 May 2016 | Published: 31 Dec 2015

Dell Software

Barracuda NG Firewall Model F1000
sponsored by Barracuda Networks
WHITE PAPER: This white paper shows you how to centrally control your security system to prevent it from weakening over time as the infrastructure evolves. Learn how to strengthen your perimeter firewall protection while enabling flexibility to allow for change in the future.
Posted: 06 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Cost of Data Breach – Impact of Business Continuity Management
sponsored by IBM
WHITE PAPER: This report examines two factors that affect the financial consequences of a data breach. The first is executive involvement security strategy and response to data breaches. The second is the purchase of cyber insurance to mitigate the cost of a data breach. Access now to learn how to best mitigate cyber breaches and protect reputation.
Posted: 06 May 2016 | Published: 01 May 2015

IBM

Deliver reliable, fast, and secure networks for improved APM
sponsored by Ixia
WHITE PAPER: How can an intelligent visibility framework provide smarter application performance monitoring and enhance security tools? Get an overview of the benefits of these tools and what's needed to create a fast, reliable and secure network for greater customer satisfaction.
Posted: 06 May 2016 | Published: 01 Mar 2016

Ixia

On-demand Webcast: Top Security Challenges and Best Practices when Moving to the Cloud
sponsored by Intel Security
WEBCAST: Learn about the latest research into secure cloud computing from some of the leading authorities in the industry, such as the foremost security guru from the Cloud Security Alliance, Jim Reavis. You discover how perceptions about cloud computing and security continue to impact adoption, best practices for choosing a secure cloud provider.
Posted: 06 May 2016 | Premiered: Apr 1, 2016

Intel Security

Blue Skies Ahead? The State of Cloud Adoption
sponsored by Intel Security
WHITE PAPER: IT needs greater visibility to achieve better trust in cloud security. This comprehensive report reveals the results of a survey conducted with 1,200 IT decision-makers across 8 different countries about the security challenges they've faced with cloud adoption.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security

IBM Guardium: Database security tool overview
sponsored by IBM
EGUIDE: This e-guide shows you a proven security system that offers real-time, policy-based monitoring of database activities, including privileged user actions. Access now to learn how you can predefine security policies and put in place triggers alerts when sensitive data is accessed, and block if necessary.
Posted: 06 May 2016 | Published: 03 May 2016

IBM

Threat Defenses, Security Projects, and Cloud Security
sponsored by TrendMicro
EGUIDE: As 2016 gets underway, many security professionals will have the opportunity to look at advanced threats and indicators of compromise through a different lens. This exclusive e-guide takes a look at today's threat landscape and what organizations are doing to ensure data is protected.
Posted: 06 May 2016 | Published: 29 Apr 2016

TrendMicro

Data Breach Digest 2016: 500 cybersecurity incidents investigated
sponsored by Verizon
WHITE PAPER: 84-page Data Breach Digest shines a light on some of the most prevalent incident scenarios to show you what you can do in the face of disaster. Access now to learn how you can best mitigate threats in the future.
Posted: 05 May 2016 | Published: 01 Apr 2016

Verizon

Get Ahead of Your Next Security Breach
sponsored by Dell Software
WHITE PAPER: An outline of the five steps you can take to protect your organization from the inherent risks of privileged accounts.
Posted: 05 May 2016 | Published: 31 Dec 2015

Dell Software

Strategies for Successfully Managing Privileged Accounts
sponsored by Dell Software
WHITE PAPER: The problem with many PAM programs is that they address only one or two of the underlying issues, leaving your organization insecure. Is your privileged identify management program on the right path? Sanity check inside.
Posted: 05 May 2016 | Published: 31 Dec 2015

Dell Software

Case Study: University of LaVerne Implements Data Protection Solution for Virtualized Environment
sponsored by Iron Mountain
CASE STUDY: In this case study, see how one organization implemented a cloud data replication service to help modernize their off-site data protection. Read on to witness how they were able to enhance program control with an automated easy-to-use system, lower storage costs with deduplication and compression, and more.
Posted: 05 May 2016 | Published: 31 Dec 2015

Iron Mountain

Disrupting Targeted Attacks Solution Guide
sponsored by Intel Security
WHITE PAPER: Reduce complexity, response time and operational costs while simultaneously improving your security posture in the face of growing risks. Access now and find out how to synthesize your IT operations and security controls to form an agile, increasingly automated (and rock-solid) security architecture.
Posted: 05 May 2016 | Published: 01 Apr 2016

Intel Security

CISO Strategies to Fight Cybercrime
sponsored by IBM
WHITE PAPER: This report outlines how CISOs are stepping up cybersecurity efforts to focus on addressing one of the most prevalent underlying issues globally – a programmatic focus on compliance instead of risk-based outcomes. Access now to learn what strategies security leaders are using to transform their organizations.
Posted: 05 May 2016 | Published: 01 Oct 2015

IBM

Elevate Data Backup with Cloud Data Replication
sponsored by Iron Mountain
EBOOK: This e-book highlights a cloud data replication solution that automatically provides offsite backup protection and long-term retention of your data. Read on to see how this software can allow your enterprise to fully protect your data offsite in a secure, compliant data center, eliminate legacy tape and backup infrastructures, and more.
Posted: 05 May 2016 | Published: 31 Dec 2015

Iron Mountain

The Evolution of Wireless Business Continuity
sponsored by Accelerated Concepts
WHITE PAPER: Discover in this white paper how to avoid expensive outages and downtime that drastically impact your reputation by formulating a business continuity plan with first-class connectivity. Learn how to take advantage of the expanding IoT to back up your business-critical data, devices, and more.
Posted: 05 May 2016 | Published: 31 Jan 2016

Accelerated Concepts

What is Advanced Hybrid Security?
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Are you prepared for complex attacks on your network? Learn how advanced hybrid security solutions meet you where you are and get you to the level of security you need.
Posted: 05 May 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

Navigating Email Security
sponsored by ZixCorp
WHITE PAPER: Learn how to protect against email data breaches with an overview of the three key groups with which to classify your emails.
Posted: 05 May 2016 | Published: 01 Apr 2016

ZixCorp

The Lifespan of Backup Tape: The Role of Tape in Today's Data Protection World
sponsored by Iron Mountain
EGUIDE: In this e-guide, discover how to increase the lifespan of your tape backup with a rotation strategy so that you can boost your overall data protection strategy. Read on to see why faster, modern tape still has a place in your cloud infrastructure and data protection strategies.
Posted: 05 May 2016 | Published: 31 Dec 2015

Iron Mountain

Extend Security and Control from the Data Center Edge to the Core
sponsored by VMware
EBOOK: The average total cost of a data breach for companies increased 23% on a year-over-year basis to a whopping $3.79 million in 2015. Micro-segmentation through network virtualization allows your security team to focus on the problem areas and minimize resource usage. Access this e-book to learn more about this strategy to better secure your data.
Posted: 05 May 2016 | Published: 29 Apr 2016

VMware

Survey Results: Mapping the Cloud Maturity Curve
sponsored by IBM
WHITE PAPER: This resource presents survey results on cloud maturity. Discover the 5 essential characteristics of high-maturity organizations, and learn about the biggest challenges that hold enterprises back from achieving cloud maturity.
Posted: 05 May 2016 | Published: 05 May 2016

IBM

Case Study: Veterans United Home Loans Simplifies Their Data Management
sponsored by Commvault
VIDEO: Watch this webcast to see how Veterans United Home Loans implemented a flexible data management solution that enabled them to manage their data at multiple sites and provide reliable services to their customers. Access now to learn more about this resilient, scalable, and secure solution.
Posted: 05 May 2016 | Premiered: 15 Oct 2015

Commvault

How to Create a Successful Data Archiving Strategy
sponsored by ArcMail Technology
EGUIDE: This e-guide uncovers the technical tools and processes you should look into for an effective data archiving strategy. Access now to discover the benefits a successful data strategy can bring to your enterprise, including reduced backup windows, knowledge retention, improved system performance, and more.
Posted: 06 May 2016 | Published: 04 May 2016

ArcMail Technology
176 - 200 of 2686 Matches Previous Page    6 7 8 9 10 11    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement