IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
201 - 225 of 2682 Matches Previous Page  |  Next Page
Blue Skies Ahead? The State of Cloud Adoption
sponsored by Intel Security
WHITE PAPER: IT needs greater visibility to achieve better trust in cloud security. This comprehensive report reveals the results of a survey conducted with 1,200 IT decision-makers across 8 different countries about the security challenges they've faced with cloud adoption.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security

IBM Guardium: Database security tool overview
sponsored by IBM
EGUIDE: This e-guide shows you a proven security system that offers real-time, policy-based monitoring of database activities, including privileged user actions. Access now to learn how you can predefine security policies and put in place triggers alerts when sensitive data is accessed, and block if necessary.
Posted: 06 May 2016 | Published: 03 May 2016

IBM

Threat Defenses, Security Projects, and Cloud Security
sponsored by TrendMicro
EGUIDE: As 2016 gets underway, many security professionals will have the opportunity to look at advanced threats and indicators of compromise through a different lens. This exclusive e-guide takes a look at today's threat landscape and what organizations are doing to ensure data is protected.
Posted: 06 May 2016 | Published: 29 Apr 2016

TrendMicro

Data Breach Digest 2016: 500 cybersecurity incidents investigated
sponsored by Verizon
WHITE PAPER: 84-page Data Breach Digest shines a light on some of the most prevalent incident scenarios to show you what you can do in the face of disaster. Access now to learn how you can best mitigate threats in the future.
Posted: 05 May 2016 | Published: 01 Apr 2016

Verizon

Get Ahead of Your Next Security Breach
sponsored by Dell Software
WHITE PAPER: An outline of the five steps you can take to protect your organization from the inherent risks of privileged accounts.
Posted: 05 May 2016 | Published: 31 Dec 2015

Dell Software

Strategies for Successfully Managing Privileged Accounts
sponsored by Dell Software
WHITE PAPER: The problem with many PAM programs is that they address only one or two of the underlying issues, leaving your organization insecure. Is your privileged identify management program on the right path? Sanity check inside.
Posted: 05 May 2016 | Published: 31 Dec 2015

Dell Software

Case Study: University of LaVerne Implements Data Protection Solution for Virtualized Environment
sponsored by Iron Mountain
CASE STUDY: In this case study, see how one organization implemented a cloud data replication service to help modernize their off-site data protection. Read on to witness how they were able to enhance program control with an automated easy-to-use system, lower storage costs with deduplication and compression, and more.
Posted: 05 May 2016 | Published: 31 Dec 2015

Iron Mountain

Disrupting Targeted Attacks Solution Guide
sponsored by Intel Security
WHITE PAPER: Reduce complexity, response time and operational costs while simultaneously improving your security posture in the face of growing risks. Access now and find out how to synthesize your IT operations and security controls to form an agile, increasingly automated (and rock-solid) security architecture.
Posted: 05 May 2016 | Published: 01 Apr 2016

Intel Security

CISO Strategies to Fight Cybercrime
sponsored by IBM
WHITE PAPER: This report outlines how CISOs are stepping up cybersecurity efforts to focus on addressing one of the most prevalent underlying issues globally – a programmatic focus on compliance instead of risk-based outcomes. Access now to learn what strategies security leaders are using to transform their organizations.
Posted: 05 May 2016 | Published: 01 Oct 2015

IBM

Elevate Data Backup with Cloud Data Replication
sponsored by Iron Mountain
EBOOK: This e-book highlights a cloud data replication solution that automatically provides offsite backup protection and long-term retention of your data. Read on to see how this software can allow your enterprise to fully protect your data offsite in a secure, compliant data center, eliminate legacy tape and backup infrastructures, and more.
Posted: 05 May 2016 | Published: 31 Dec 2015

Iron Mountain

The Evolution of Wireless Business Continuity
sponsored by Accelerated Concepts
WHITE PAPER: Discover in this white paper how to avoid expensive outages and downtime that drastically impact your reputation by formulating a business continuity plan with first-class connectivity. Learn how to take advantage of the expanding IoT to back up your business-critical data, devices, and more.
Posted: 05 May 2016 | Published: 31 Jan 2016

Accelerated Concepts

What is Advanced Hybrid Security?
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Are you prepared for complex attacks on your network? Learn how advanced hybrid security solutions meet you where you are and get you to the level of security you need.
Posted: 05 May 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

Navigating Email Security
sponsored by ZixCorp
WHITE PAPER: Learn how to protect against email data breaches with an overview of the three key groups with which to classify your emails.
Posted: 05 May 2016 | Published: 01 Apr 2016

ZixCorp

The Lifespan of Backup Tape: The Role of Tape in Today's Data Protection World
sponsored by Iron Mountain
EGUIDE: In this e-guide, discover how to increase the lifespan of your tape backup with a rotation strategy so that you can boost your overall data protection strategy. Read on to see why faster, modern tape still has a place in your cloud infrastructure and data protection strategies.
Posted: 05 May 2016 | Published: 31 Dec 2015

Iron Mountain

Extend Security and Control from the Data Center Edge to the Core
sponsored by VMware
EBOOK: The average total cost of a data breach for companies increased 23% on a year-over-year basis to a whopping $3.79 million in 2015. Micro-segmentation through network virtualization allows your security team to focus on the problem areas and minimize resource usage. Access this e-book to learn more about this strategy to better secure your data.
Posted: 05 May 2016 | Published: 29 Apr 2016

VMware

Survey Results: Mapping the Cloud Maturity Curve
sponsored by IBM
WHITE PAPER: This resource presents survey results on cloud maturity. Discover the 5 essential characteristics of high-maturity organizations, and learn about the biggest challenges that hold enterprises back from achieving cloud maturity.
Posted: 05 May 2016 | Published: 05 May 2016

IBM

Case Study: Veterans United Home Loans Simplifies Their Data Management
sponsored by Commvault
VIDEO: Watch this webcast to see how Veterans United Home Loans implemented a flexible data management solution that enabled them to manage their data at multiple sites and provide reliable services to their customers. Access now to learn more about this resilient, scalable, and secure solution.
Posted: 05 May 2016 | Premiered: 15 Oct 2015

Commvault

Discovering Security Analytics Use Cases
sponsored by Prelert
RESOURCE: In this resource, discover how to tailor your security analytics to detect certain behaviors associated with threats advancing on your organization. Select each threat indicator to examine its particular attack progression stages for data exfiltration activity, compromised endpoints, and more.
Posted: 05 May 2016 | Published: 05 May 2016

Prelert

The IoT Journey: Freight Farms Conquers Data Challenges
sponsored by Xively by LogMeIn
WEBCAST: Freight Farms, a network of urban farms that shares data every minute, struggled to scale their system to handle millions of data points and securely manage access control for every single device. In this webinar, discover the strategy that empowered Freight Farms to conquer these challenges and create optimal user experiences.
Posted: 05 May 2016 | Premiered: May 5, 2016

Xively by LogMeIn

Advancing Cyber-Security Measures Inside
sponsored by VMware
WHITE PAPER: In this infographic, discover how to secure your network and data center from the inside and bolster your existing perimeter defenses.
Posted: 05 May 2016 | Published: 01 Apr 2016

VMware

Infographic: Modernizing Production and Data Protection
sponsored by SimpliVity
RESOURCE: This infographic highlights a hyperconverged infrastructure that provides built-in backup and DR to modernize production and data protection environments. Access now to witness how this infrastructure can simplify your storage management and provide your enterprise with benefits such as reduced risk, efficient data storage, and more.
Posted: 05 May 2016 | Published: 31 Dec 2015

SimpliVity

Four enterprise scenarios for deploying database security tools
sponsored by IBM
EGUIDE: This e-guide shows you some classic use cases and how organizations are using security add-ons to boost database security. Learn the real benefits and challenges in selecting the right database security software to address the issues your organization faces.
Posted: 04 May 2016 | Published: 03 May 2016

IBM

4 Ways Data Loss Prevention Can Help Meet More Stringent HIPAA Enforcement
sponsored by Digital Guardian
WHITE PAPER: Implemented correctly, data loss prevention (DLP) can help your organization maintain HIPAA compliance. This white paper reviews 4 specific HIPAA statutes and how DLP helps your organization comply with each.
Posted: 04 May 2016 | Published: 01 Apr 2016

Digital Guardian

Control and Secure Sensitive Data
sponsored by Citrix
WHITE PAPER: Enterprise file sync and sharing (EFSS) services have become valuable tools as they allow organizations to delve into mobility without compromising data security or compliance. Access this resource to learn about an EFSS service that provides IT teams with flexibility, visibility and control over sensitive data.
Posted: 04 May 2016 | Published: 30 Dec 2015

Citrix

Securing Real-Time Mobile Communications
sponsored by Mitel Networks Limited
WHITE PAPER: This white paper offers contemporary real-time communications services that are secured end-to-end. Allow employees to communicate remotely through any device using strict identity management tools that ensure your information won't be sent to anyone without proper authorization.
Posted: 04 May 2016 | Published: 01 Apr 2016

Mitel Networks Limited
201 - 225 of 2682 Matches Previous Page    7 8 9 10 11 12    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement