IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
226 - 250 of 2509 Matches Previous Page  |  Next Page
Beware the Beastly Threats of IT security
sponsored by Lenovo
WHITE PAPER: It's essential that IT professionals have the right tools to build safeguards against them as battling threats is more critical for organizations than ever— in dollars and in brand reputation. This eBook explores 6 beastly threats scratching at the perimeter of your company's computers and IT networks, and where these threats are trending.
Posted: 01 May 2017 | Published: 01 May 2017

Lenovo

7 Keys to Unified Data Protection Vendor Evaluation
sponsored by Veritas
WHITE PAPER: Having a unified data protection platform is the way to ensure that your data is both secure and visible. Access this white paper to see gain an understanding of what to look for in a vendor and how two unified data protection vendors compare to each other based on 7 key aspects.
Posted: 27 Apr 2017 | Published: 28 Feb 2017

Veritas

Unified Data Protection Vendor Comparison
sponsored by Veritas
WHITE PAPER: The digital transformation of business requires enterprise data management that delivers protection, availability and insights. See how Veritas and NetBackup provide the easy foundation for enterprise data management. Download this document to learn how Veritas compares to other vendors in the field.
Posted: 27 Apr 2017 | Published: 30 Dec 2016

Veritas

The currency of trust: why banks and insurers must make customer data safer and more secure
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

ComputerWeekly.com

How Transactional Analytics is Enabling Digital Payments Transformation
sponsored by Aerospike
WHITE PAPER: Learn how transactional analytics can help you keep up with the rapid changes wrought on eCommerce by technologies like mobile payment apps and non-banking payment service providers (FinTech). Discover how to leverage a database with a hybrid memory architecture and machine learning to transform digital payments.
Posted: 20 Apr 2017 | Published: 20 Apr 2017


Data protection: Not just about personal data and compliance
sponsored by ComputerWeekly.com
EGUIDE: Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.
Posted: 18 Apr 2017 | Published: 18 Apr 2017

ComputerWeekly.com

Rethinking Enterprise Data Management: A 360-Degree View
sponsored by Veritas
RESOURCE: Download to discover a strategy for navigating the enterprise data management slalom with data backup and protection tools as the foundation. Learn more about this 360-degree approach here, which digs into unstructured data and executes intelligent decisions on how to treat each data type.
Posted: 14 Apr 2017 | Published: 31 Dec 2016

Veritas

Cloud Data Management Tailor-Made For Your Business
sponsored by Veritas
RESOURCE: 74% of organizations have a multi-cloud strategy and 71% operate in a hybrid cloud model. As this trend continues to grow, data visibility, protection, and simplified cloud migration are all taking center stage. Access this infographic to learn about these 3 cloud data management focus areas and how to factor them into your cloud strategy.
Posted: 14 Apr 2017 | Published: 30 Dec 2016

Veritas

Ransomware Detection and Prevention Tools You Need Now
sponsored by SearchSecurity.com
EBOOK: Fighting today's malware threats requires a range of ransomware prevention tools. Learn how to tweak the tools you have and identify what new tools you need.
Posted: 13 Apr 2017 | Published: 05 Mar 2017

SearchSecurity.com

Secure Remote Access Case Study: City of Santa Barbara
sponsored by Array Networks
CASE STUDY: The City of Santa Barbara needed a way to provide anytime, anywhere access to documents, files and email from any device, while maintaining the security of confidential information, regardless of the device used to access it. Download this case study to find out how the City of Santa Barbara solved these challenges.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

Array Networks

Don't Settle, Choose the Best Mobile Security Platform for Your Mobile Transformation
sponsored by MobileIron
WHITE PAPER: This white paper explores how to leverage a modern, scalable EMM platform to bolster your mobile security strategy. Access a comparison guide between AirWatch and MobileIron and learn how to enhance your strategy for securing all things mobile, from apps to emails and beyond.
Posted: 05 Apr 2017 | Published: 31 Dec 2016

MobileIron

Jargon buster guide to GDPR
sponsored by ComputerWeekly.com
EGUIDE: In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.
Posted: 31 Mar 2017 | Published: 31 Mar 2017

ComputerWeekly.com

Information Governance: Protect Your Company's Assets
sponsored by Box
WHITE PAPER: This white paper explores how to leverage the cloud content management platform from Box to implement a sound information governance program for you organization. Discover how to reduce risks and gain control over who can see and use information and how it is kept.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

Box

Investing in the Data Center to Meet Modern Customer Demands
sponsored by Red Hat
PRESENTATION: Data center modernization is one way to boost digital transformation and innovation efforts. Read on to see what Forrester found in their research on how organizations are going about their modernization, the benefits they are realizing, and more.
Posted: 16 Mar 2017 | Published: 07 Dec 2016

Red Hat

Cyber-physical attacks: Dawn of a new age in cyber-warfare?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series explores the application of cyber power in international relations
Posted: 14 Mar 2017 | Published: 14 Mar 2017

ComputerWeekly.com

How to Manage Oracle E-Business Suite Apps and Databases
sponsored by Data Intensity
ESSENTIAL GUIDE: In this expert e-guide, explore how to simplify and achieve a number of tasks that go into managing Oracle E-Business Suite (EBS) and databases, including patch updates, improving security, and managing cost-based optimizer stats.
Posted: 26 Apr 2017 | Published: 20 Apr 2017

Data Intensity

SaaS Analytics: Safe and Certain Reporting
sponsored by IBM
WHITE PAPER: In this white paper, learn how one multi-national firm was able to maintain Cognos while keeping sensitive data on premises. Plus, discover how 2 more companies were able to access data wherever it resides, create efficiencies and cost savings, and more.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

IBM

What to Consider Before Buying Database Performance Monitoring Tools
sponsored by SearchDataManagement
EBOOK: To help you select the right tool, or tools, to meet your organization's particular database needs, this buyer's handbook offers advice from Mullins on the key features and functions to look for across the different product categories.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

SearchDataManagement

Don't Rush into Cloud Databases without a Well-Grounded Plan
sponsored by Data Intensity
EGUIDE: In this expert e-guide, DBA Brian Peasland helps you weigh the benefits of moving to the cloud. Discover how to take a strategic approach to implementing an Oracle cloud database that anticipates a variety of challenges from legal regulations to data security.
Posted: 17 Apr 2017 | Published: 07 Apr 2017

Data Intensity

Empower Innovation with the Right Unified Collaboration Strategy
sponsored by IBM
WHITE PAPER: Not only can effective collaboration tools better meet standards for enterprise security, but the business benefits are profound and well-documented. Discover integrated, cloud-based tools that can improve ROI, lower TCO, increase efficiency and user satisfaction, and more.
Posted: 05 Apr 2017 | Published: 05 Apr 2017

IBM

Five Windows 10 security risks that are easy to overlook
sponsored by vmware airwatch
EGUIDE: As more organizations upgrade from Windows 7, the time is right to think about how to create the perfect Windows 10 security setup. But before upgrading to Windows 10, understand these 5 security risks that are easy to overlook.
Posted: 27 Mar 2017 | Published: 17 Mar 2017

vmware airwatch

The Essential Guide to Storage for DevOps
sponsored by Tintri
WEBCAST: When it comes to DevOps, you might be overlooking the significance of cloud storage. Access this e-book to learn about the significant impact the right--or wrong--cloud storage in place will have on your DevOps' development.
Posted: 27 Mar 2017 | Premiered: Dec 30, 2016

Tintri

The Essential Guide Data Protection and Disaster Recovery
sponsored by Tintri
WHITE PAPER: Download this guide to understand the must-have storage features that are essential to modern DP and DR practices;provided are specific guidelines on what to look for, how to strategize DR in your organization, and more.
Posted: 24 Mar 2017 | Published: 24 Mar 2017

Tintri

EMM Real Benefits in Today's Mobile World
sponsored by vmware airwatch
WHITE PAPER: The economy isn't standing still. For your business to succeed, your employees shouldn't either. This eBook relays the importance of unifying your infrastructure to deliver apps effectively across multiple devices. Learn how to stay on top of security and consistency with enterprise mobility management.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

vmware airwatch

Five Key Indicators that You Need to Adopt EMM Now
sponsored by vmware airwatch
WHITE PAPER: How do you know if your organization is ready to make the move to enterprise mobility management (EMM)? Read this white paper to determine if it is the right time to adopt EMM, especially if your organization experiences: Increased need for security and compliance, device expansion or rapid growth.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

vmware airwatch
226 - 250 of 2509 Matches Previous Page    8 9 10 11 12 13    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement