IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
201 - 225 of 2656 Matches Previous Page  |  Next Page
Computer Weekly – Dell Technologies aims for an intelligent, connected future
sponsored by ComputerWeekly.com
EBOOK: In this week's Computer Weekly, as Dell and EMC complete the largest IT supplier merger in history, we look at the new company's strategy. Our latest buyer's guide examines a key aspect of using cloud – cloud bursting. And we assess the latest views on the UK government's plans for internet surveillance legislation. Read the issue now.
Posted: 12 Sep 2016 | Published: 13 Sep 2016

ComputerWeekly.com

The Modern Cybercriminal's Attempt to Stay Undetected
sponsored by Dell SecureWorks
WHITE PAPER: This short infographic gives you an in-depth look at the timeline of the average data breach from penetration to detection. Learn the game plan of a cybercriminal looking to steal your data and prepare a defensive scheme of your own to stop hackers in any phase of the breach lifecycle.
Posted: 09 Sep 2016 | Published: 01 Aug 2016

Dell SecureWorks

Making File Sharing Easy in a Virtual Environment
sponsored by Citrix
RESOURCE: Learn how a new file sharing program can improve collaboration inside and outside the organization, reduce storage cost, and equalize the experiences of working on a physical or virtual desktop.
Posted: 08 Sep 2016 | Published: 08 Sep 2016

Citrix

The Hidden Cost of Compliance
sponsored by Imperva
RESOURCE: Learn how to cut back on hidden database compliance costs in this short infographic.
Posted: 08 Sep 2016 | Published: 08 Sep 2016

Imperva

How To Get the Most Out of SOCs
sponsored by ServiceNow
EGUIDE: This e-guide teaches you how to refocus your security efforts on detection through continuous monitoring and greater network visibility. Learn how to set up your security operations center (SOC) to achieve more timely detection capabilities and learn from industry-recognized security expert Eric Cole, on how to get the most out of SOCs.
Posted: 07 Sep 2016 | Published: 31 Aug 2016

ServiceNow

A themed issue looking at the latest trends in print management
sponsored by MicroScope
EZINE: A themed issue of the ezine looking at the opportunities for the channel in the managed print world
Posted: 02 Sep 2016 | Published: 02 Sep 2016

MicroScope

Architecture Overview: SAP HANA with Lenovo System x and NetApp FAS/AFF Systems with NFS
sponsored by SAP/Lenovo/Intel
WHITE PAPER: This document outlines an integrated SAP HANA architecture, built with tailored data center integration, Lenovo servers, and NetApp data storage systems. Read on to utilize this architecture's data protection for business-critical SAP applications; also illustrated are guidelines for implementation, DR, development, and testing.
Posted: 02 Sep 2016 | Published: 31 Mar 2016

SAP/Lenovo/Intel

Federal Agencies Have a BYOD Program, Like It or Not
sponsored by Lookout
RESEARCH CONTENT: Shadow BYOD introduces a risk of sensitive data leakage due to its lack of visibility and control of access. This report details how shadow BYOD has become a concern for the federal government. Access now to learn about shadow BYOD and how to properly manage personal devices by taking using mobile device management and security solutions.
Posted: 02 Sep 2016 | Published: 29 Jul 2016

Lookout

Secure Content Collaboration Across All Devices
sponsored by Citrix
RESOURCE: This resource explores how you can create custom workflows that automate feedback and approval processes as well as allow you to work with the confidence that your files are secure on any device. Find out how you can protect sensitive documents, streamline document approvals and feedback, and increase your organization's flexibility.
Posted: 02 Sep 2016 | Published: 02 Sep 2016

Citrix

Transform the Economics of Data Storage with Optimal Efficiency
sponsored by IBM
DATA SHEET: In this brief data sheet, learn about an enterprise-class hybrid storage solution that transforms the economics of data storage. Read on to see how it complements virtual server environments and its ability to deliver the flexibility and responsiveness your business needs.
Posted: 02 Sep 2016 | Published: 31 Aug 2016

IBM

2016 Cost of Data Breach Study United States
sponsored by IBM
WHITE PAPER: This Ponemon Institute Study includes data breach information over the past year from 64 organizations in 16 industry sectors located in the United States.
Posted: 01 Sep 2016 | Published: 01 Jun 2016

IBM

2016 Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This Ponemon Institute study encapsulates the results of 383 organizations from 12 countries gathering recent data breach trends and costs of remediation.
Posted: 01 Sep 2016 | Published: 01 Jun 2016

IBM

How to Unlock EMS: 3 Things You Need to Know to Capitalize on Enterprise Mobility Suite
sponsored by Microsoft
PRESENTATION: In the era of mobility, BYOD is a major concern. The Enterprise Mobility Suite (EMS) is a sweeping platform that works with existing cloud platforms, and covers mobile management and data protection. Access this brief resource to learn just what EMS is capable of and the value it has to offer.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

Microsoft

IBM Data Protection Modernization and Strategy: An ESG Webinar
sponsored by IBM
VIDEO: In order to meet a wide variety of SLAs, you need a continuum of backup technologies suitable for every type of data protection instance. Tune into this webinar as ESG Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, analyze today's vast range of data protection modernization issues and strategies.
Posted: 30 Aug 2016 | Premiered: 31 Mar 2016

IBM

2016 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This in-depth analysis outlines what IT and security professionals learned from 2015's cyberattacks. Discover which industries were most targeted, the role insiders played in exploitation of vulnerabilities and, most importantly, what you can do to avoid catastrophic data loss.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

IBM

Trends in SAP Cybersecurity
sponsored by IBM
WHITE PAPER: The purpose of this Ponemon Institute study, which encapsulates the survey results of 607 IT and IT security practitioners, is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.
Posted: 29 Aug 2016 | Published: 01 Feb 2016

IBM

ESG Video Interview: Virtualization-Driven Data Protection Modernization
sponsored by IBM
VIDEO: ESG Principal Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, hash out the essentials of modern virtualization-driven data protection. Tune in now to learn how to modernize continuous protection that keeps up with your accelerated production.
Posted: 29 Aug 2016 | Premiered: 31 Mar 2016

IBM

Help Minimize Impact to Patient Care in the Event of a Disaster
sponsored by McKesson Corporation
WHITE PAPER: Disaster recovery (DR) services can keep your critical patient data and systems safe and accessible with cost-efficient replication and infrastructure recovery for virtual environments. Discover how a DR service can help your health care organization limit disruptions to patient care, reduce infrastructure, storage and staffing costs, and more.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

McKesson Corporation

Simplified Data Protection for the Modern Enterprise: An Expert Evaluation
sponsored by IBM
VIDEO: Tune into this video as ESG Senior Lab Analyst Vinny Choinski breaks down an advanced data backup and recovery platform for virtual, physical, cloud, and software-defined environments. Watch now to enhance your enterprise's data protection by mitigating the risk of data loss, reducing total cost of protection, and more.
Posted: 29 Aug 2016 | Premiered: 30 Mar 2016

IBM

Tolly Test Report: Evaluating a Web Protection Vendor
sponsored by IBM
WHITE PAPER: In this test report, The Tolly Group evaluates a top web protection vendor to see how they stack up in the highly vulnerable web threat landscape. Learn how you can gain flexible risk-based access with strong authentication capabilities while protecting against a wide range of application exploits.
Posted: 29 Aug 2016 | Published: 01 Jun 2016

IBM

7 Key Challenges to Value-Based Care: Ensuring Patient-Centered Care With Information Management
sponsored by Information Builders
WHITE PAPER: This white paper explores how to address some of the challenges of moving towards value-based healthcare with a strategy for improving the way patient data is collected, managed, and exchanged. Access now to find out more about an integrated approach to master data management, data quality, information management, and more.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

Information Builders

Computer Weekly – 30 August 2016: Get protected
sponsored by ComputerWeekly.com
EZINE: It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.
Posted: 26 Aug 2016 | Published: 30 Aug 2016

ComputerWeekly.com

Clearing the Confusion of Modern Data Protection
sponsored by IBM
WEBCAST: One aspect of IT that everyone agrees upon is the need for better data protection. But what they don't always agree on is how to provide it. View this webcast where Jason Buffington, senior analyst at ESG, takes an in-depth look at modern data protection and explains why when you modernize production, you must modernize protection.
Posted: 26 Aug 2016 | Premiered: Jan 7, 2016

IBM

Is the Hybrid Storage Array Dying?
sponsored by Dell EMC
EGUIDE: Is hybrid storage heading toward extinction? Discover if hybrid storage with HDDs is indeed a dying breed, as well as examine the challenges confronting today's flash data storage simplification. Additionally, learn the top 9 reasons for the increased adoption of object-level storage.
Posted: 30 Aug 2016 | Published: 29 Aug 2016

Dell EMC

Utilizing SSD Flash and Object Storage: Should Both Be Used Simultaneously?
sponsored by Dell EMC
EGUIDE: Is it possible to increase object storage performance by as much as 100 times? Now may be the time to deploy SSD flash and object storage together, and in this guide, learn the performance and reliability benefits of utilizing both simultaneously. As a bonus, read on to access seven tips for improving data storage efficiency.
Posted: 30 Aug 2016 | Published: 29 Aug 2016

Dell EMC
201 - 225 of 2656 Matches Previous Page    7 8 9 10 11 12    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement