IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
201 - 225 of 2741 Matches Previous Page  |  Next Page
Cost of a Data Breach Calculator
sponsored by IBM
RESOURCE: This short survey helps you identify your organization's risk profile, which includes your organization's risk of experiencing a data breach, the average cost per compromised record and the total cost of a data breach to your organization.
Posted: 25 Jul 2016 | Published: 01 Jun 2016

IBM

Accelerated i/O: Move Large Data Sets Into and Out Of the Cloud
sponsored by Signiant, Inc.
WHITE PAPER: Discover in this white paper how to automate secure data movement to and from AWS S3 and Microsoft Azure Blob cloud object storage. Learn how to inject large amounts of data into the cloud while taking care to maintain the order of the data stream in the event of data loss.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Signiant, Inc.

Infographic – IRM Underground Data Center
sponsored by Iron Mountain
WHITE PAPER: Discover one of the most secure data centers in the universe, built 220 feet underground, wrapped in 220,000 square feet of vault. It houses some of the world's greatest treasures; learn how it can protect your precious assets.
Posted: 25 Jul 2016 | Published: 31 Dec 2015

Iron Mountain

Key Features and Functions of EMC Isilon in Big Data Workflows
sponsored by Dell EMC
ANALYST REPORT: This white paper evaluates a scale-out data lake platform that provides robust multi-protocol ingest capabilities to make it easier to build a Big Data workflow in a data lake. Learn more about the key features of this solution and see how it can enable your enterprise to simplify your data management operations and keep your data secure.
Posted: 25 Jul 2016 | Published: 31 Mar 2016

Dell EMC

Secure, Scalable Collaboration with Predictable GPU Acceleration and Low TCO
sponsored by AMD
WHITE PAPER: Discover how manufacturers can stay competitive in today's economy with VDI powered by hardware-based GPU virtualization technology and see benefits including empowering mobility and collaboration, safeguarding sensitive data, efficient IT management, and more.
Posted: 22 Jul 2016 | Published: 30 Jun 2016

AMD

How Industry Collaboration Mitigates Cybersecurity Risks
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

Easy Collaboration and Version Control with Full GPU Performance and Data Security
sponsored by AMD
WHITE PAPER: Learn how VDI powered by hardware-based virtualized GPU technology empowers GPU-accelerated mobility and collaboration while simplifying version control, safeguarding sensitive data, and more.
Posted: 21 Jul 2016 | Published: 30 Jun 2016

AMD

Defending the Indefensible: Preparing for an Uncertain Digital Future
sponsored by LogRhythm, Inc.
WHITE PAPER: The following discussion explores fundamental challenges in enforcing cybersecurity measures, the financial burden of prevailing security approaches, and suggested solutions to overcome vulnerabilities in existing infrastructures. Access now to learn what CSOs are saying about the state of corporate cybersecurity.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

LogRhythm, Inc.

10 REASONS TO TEST, NOT GUESS
sponsored by Trustwave
WHITE PAPER: This infographic gives you 10 reasons you should test, not guess the strength of your security. Create a testing plan based on these 10 reasons and strengthen your security posture through more informed decision making.
Posted: 21 Jul 2016 | Published: 31 Dec 2015

Trustwave

Online Phishing
sponsored by Navex Global
WEBCAST: Through real world examples and quizzes throughout, learn how to spot phishing scams and enable your employees to do the same. Protect your organization from illegitimate emails with this short, interactive resource.
Posted: 20 Jul 2016 | Premiered: Jun 1, 2016

Navex Global

Reference Guide: Acceptable Use Policy
sponsored by Navex Global
WHITE PAPER: This reference guide provides an example of an acceptable use policy of computer systems at an organization. Use this sample as a guideline for developing your own policy.
Posted: 20 Jul 2016 | Published: 01 Jun 2016

Navex Global

IT Security for Retail
sponsored by Trustwave
WHITE PAPER: This white paper emphasizes a multi-layer defense program against attacks. This approach helps you avoid infection, halt propagation, stop exfiltration and unify your security systems.
Posted: 19 Jul 2016 | Published: 01 Jun 2016

Trustwave

Simple, Secure, Affordable Hosted Archiving
sponsored by eTECH Channel
WHITE PAPER: Explore a reliable and secure enterprise archiving solution that eliminates the need for additional storage management by securing data in off-site locations. Discover how this solution can enable your enterprise to boost the efficiency of your diagnostics, search and recovery, and data security capabilities.
Posted: 19 Jul 2016 | Published: 19 Jul 2016

eTECH Channel

Get the Incident Responder’s Field Guide: Lessons from a Fortune 100 Incident Response Leader
sponsored by Digital Guardian
WHITE PAPER: The Digital Guardian Incident Responder's Field Guide provides a formal, coordinated approach for responding to security attacks that affect information assets. Written by Tim Bandos, a former Fortune 100 cyber security leader, this e-book provides easy-to-follow steps for crafting an Incident Response plan.
Posted: 19 Jul 2016 | Published: 01 Jun 2016

Digital Guardian

Tale of the Tape: Moving Backup and Recovery to the Cloud
sponsored by Iron Mountain
VIDEO: Discover a cloud-based data replication solution that effectively protects and recovers data as well as boosts efficiency and connectivity. Watch and explore how this solution can allow your enterprise to simplify recovery and preserve data for the long-term.
Posted: 19 Jul 2016 | Premiered: 31 Aug 2015

Iron Mountain

Don't Let Your Data Outgrow You: Stay Ahead with Smart, Scalable Archiving
sponsored by Dell EMC
WHITE PAPER: Explore an efficient, scalable disk-based archive solution that can enable your enterprise to simplify data management and protection, scale capacity quickly without disruption, optimize with automated storage tiering, and more.
Posted: 18 Jul 2016 | Published: 31 Oct 2015

Dell EMC

2016 Security Pressures Report
sponsored by Trustwave
WHITE PAPER: The recommendations in this report serve as a reliable compass of where your security efforts need to be in 2016. Use these suggestions to not only ease pressure, but to improve your security posture overall.
Posted: 18 Jul 2016 | Published: 01 Jun 2016

Trustwave

3 Steps to Create a Data Protection Lifecycle Management Strategy
sponsored by Iron Mountain
WHITE PAPER: Discover 3 critical steps in creating a strategy for your data's lifecycle that will give you more opportunities to protect, preserve and serve your digital assets.
Posted: 15 Jul 2016 | Published: 01 Jun 2016

Iron Mountain

Archive All of Your Business Critical Data in One Archive
sponsored by eTECH Channel
WHITE PAPER: Explore a data archive solution that de-duplicates, indexes, compresses, and archives data. Discover how this platform can provide your enterprise with the speed and storage necessary to handle increased volumes and variety of email, social media, and other data sources.
Posted: 14 Jul 2016 | Published: 14 Jul 2016

eTECH Channel

Salesforce Shield for Healthcare
sponsored by Salesforce.com
WHITE PAPER: Learn how healthcare organizations can secure protected health data in the cloud while meeting compliance and governance requirements.
Posted: 14 Jul 2016 | Published: 14 Jul 2016

Salesforce.com

How to Protect Your Data in a Converged Infrastructure Environment
sponsored by Hewlett Packard Enterprise
RESOURCE: Download this infographic to improve capacity utilization for the new influx of mobile, cloud, and big data with a converged storage environment. Learn why you should consider a converged storage environment to optimize your data protection and enable seamless data movement between devices.
Posted: 14 Jul 2016 | Published: 14 Jul 2016

Hewlett Packard Enterprise

Get Your Apps Back in Business
sponsored by Dell Software
WHITE PAPER: Discover a cloud-era data protection solution that combines rapid snap technology and recovery repository to back up, replicate, verify, and restore your data anywhere. Read on and explore how you can eliminate downtime and protect your critical workloads with this single, unified solution.
Posted: 13 Jul 2016 | Published: 31 Dec 2015

Dell Software

4 Cybersecurity Trends that Might Be Affecting Your Organization
sponsored by Navex Global
ANALYST REPORT: In this blog post, you'll learn 4 top cybersecurity trends that could be affecting your organization. Discover which attacks to look out for in the near future, and learn how businesses have come to rely on compliance programs to ensure that their organizations operate properly.
Posted: 13 Jul 2016 | Published: 04 May 2016

Navex Global

How to Secure Your Oracle Database 12c
sponsored by Oracle Corporation
WEBCAST: In this webcast, discover how to handle attacks on your Oracle database with preventive, detective, and administrative security controls, as well as how to employ a stratified data protection strategy. Also find out how Epsilon takes care of their data—both improving business for its customers and for database performance, security, and reporting.
Posted: 13 Jul 2016 | Premiered: Dec 31, 2015

Oracle Corporation
201 - 225 of 2741 Matches Previous Page    7 8 9 10 11 12    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement