IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
226 - 250 of 2315 Matches Previous Page  |  Next Page
Cybersecurity and Privacy Compliance: The Delicate Balance
sponsored by SearchCompliance.com
EBOOK: This handbook explores the challenges inherent in ensuring cybersecurity and maintaining user privacy, tackling the latest data governance strategies to find solutions that strike a balance between the two imperatives.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

SearchCompliance.com

Hybrid Cloud Storage Solution for Unstructured Data
sponsored by Microsoft
WHITE PAPER: This white paper highlights a hybrid cloud storage solution that addresses the complexities of unstructured data commonly associated with file shares. Access now to see how this solution can help you better manage the growth of your unstructured data.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

Microsoft

Insider Threats in the Real World
sponsored by OptioLabs
WHITE PAPER: This white paper introduces an approach to security that reduces the risk of real life insider threats, including eavesdropping, shoulder-surfing, credentials theft, and more.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

OptioLabs

Data Efficiency with Converged Secondary Storage
sponsored by Cohesity
ANALYST REPORT: This report highlights a data platform that works as a single, scalable appliance to protect your data and then use copies you already have to create snapshots for secondary uses. Access now to see how this platform can simplify your data management by eliminating the need for costly redundant data copies and redundant infrastructure silos.
Posted: 04 Dec 2015 | Published: 31 Oct 2015

Cohesity

Case Study: Richardson International
sponsored by Commvault
CASE STUDY: This case study explores Richardson International's, an agribusiness, decision to implement a software solution that could better manage and protect their virtualized corporate information. Read on to see how this software can increase your ROI by cost-efficiently protecting your data and streamlining administration.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

Commvault

Case Study: UberGlobal
sponsored by Commvault
VIDEO: Access this webcast to discover how UberGlobal implemented a scalable cloud storage platform with data deduplication capabilities that allowed them to overcome their data management challenges. Watch to see how this storage solution can provide your enterprise with cost and efficiency improvements.
Posted: 03 Dec 2015 | Premiered: 02 Nov 2015

Commvault

What's Wrong with Disaster Recovery
sponsored by Commvault
WHITE PAPER: This white paper discusses the top 7 things wrong with traditional Disaster Recovery strategies and offers tips on how to solve these problems. Access now to learn what can be done to modernize your DR approach.
Posted: 03 Dec 2015 | Published: 03 Dec 2015

Commvault

Predictive Mobile Threat Defense
sponsored by Skycure
WHITE PAPER: This white paper explains the 3 reasons why traditional mobile security approaches can no longer protect users and organizations. Access this resource now to learn how to advance mobile security into a next-gen mobile threat defense to protect networks, apps, and users.
Posted: 03 Dec 2015 | Published: 11 Nov 2015

Skycure

Backup and Disaster Recovery: The IT Experience
sponsored by Carbonite
EBOOK: This eBook explores the impact of downtime and data loss on IT departments and offers a backup solution that can help meet your disaster recovery needs. Access now to see how this backup solution can provide your enterprise with better protection and faster recovery for all your business data.
Posted: 03 Dec 2015 | Published: 03 Dec 2015

Carbonite

Mobile Security – What Works and What Doesn’t?
sponsored by IBM
EGUIDE: Should your organization be more worried about mobile malware, or Wi-FI mast stations? Find out where the true mobile security dangers lie in this expert e-guide - as well as which defenses work to mitigate these threats.
Posted: 03 Dec 2015 | Published: 25 Nov 2015

IBM

Executive Summary: Proactive Response to Incident Response
sponsored by Blue Coat Systems
WHITE PAPER: This white paper describes how to find a solution that addresses two main drivers of incident response (IR) costs. Discover key strategies for lowering costs and maximizing ROI when performing IR, with details on three maturity models.
Posted: 03 Dec 2015 | Published: 30 Sep 2015

Blue Coat Systems

Internet Password Security Holiday Shopping Roundup
sponsored by Dashlane Inc.
RESOURCE: This infographic examines the password policies of major e-commerce sites and evaluates their password security policies. View now to learn what users and businesses alike can do to strengthen password security and reduce data breaches. Uncover the top 4 user password security best practices.
Posted: 02 Dec 2015 | Published: 04 Nov 2015

Dashlane Inc.

It's Not You, It's Me: Understanding the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This white paper discusses why public cloud security is a shared responsibility and explains exactly what your role is when securing public cloud data.
Posted: 02 Dec 2015 | Published: 02 Dec 2015

Alert Logic

Swiss Army Knife Security? How to Vet Integrated Tool Sets
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at the changing delivery models for cybersecurity tools as more vendors offer multi-tool platforms and services. Let us help you make sense of it all with advice on tool consolidation.
Posted: 02 Dec 2015 | Published: 02 Dec 2015

SearchSecurity.com

When Policy and Productivity go Hand-in-Hand
sponsored by IBM
WHITE PAPER: Access this article and learn how to accommodate the new ways employees collaborate, while also maintaining a level of control and visibility over what corporate data can and cannot be shared with third-party cloud apps.
Posted: 01 Dec 2015 | Published: 22 Sep 2015

IBM

Automate PCI Compliance Monitoring, Investigation & Reporting
sponsored by AccelOps Inc.
WHITE PAPER: This helpful white paper outlines the 12 PCI DSS requirements a compliance automation strategy needs to fulfill and explores what features to look for when selecting an approach.
Posted: 01 Dec 2015 | Published: 13 Apr 2011

AccelOps Inc.

Battling Security Threats from Within your Organization
sponsored by IBM
WHITE PAPER: Access this report to discover how employees and other business partners may be taking advantage of your data. Read on and learn mitigation techniques for threats within the enterprise.
Posted: 30 Nov 2015 | Published: 30 Jun 2015

IBM

Next-Gen SIEM: 5 Ways to Faster, Better Data Center Monitoring
sponsored by AccelOps Inc.
WHITE PAPER: This white paper presents a 5 step strategy to discover and mitigate threats faster while reducing IT monitoring complexity.
Posted: 30 Nov 2015 | Published: 30 Nov 2012

AccelOps Inc.

Advanced Visual Analytics for the Modern Data Center
sponsored by AccelOps Inc.
WHITE PAPER: In this white paper, learn how to detect trends and threats in your network and data center through enhanced visibility.
Posted: 30 Nov 2015 | Published: 31 Dec 2014

AccelOps Inc.

Report: 2015 Cybersecurity Intelligence Index
sponsored by IBM
WHITE PAPER: In this report, you'll uncover the major threats to businesses worldwide over recent years, and how companies can better detect and insulate themselves from future attacks in the face of new technology.
Posted: 30 Nov 2015 | Published: 31 Jul 2015

IBM

Bring Security and Efficiency to Healthcare with Cloud Communications
sponsored by 8x8, Inc.
WHITE PAPER: This white paper explains how cloud computing can help you more efficiently share patient information without putting any of that sensitive data at risk.
Posted: 24 Nov 2015 | Published: 24 Nov 2015

8x8, Inc.

How to Protect Your Healthcare Communications in a World of Security and Compliance Threats
sponsored by 8x8, Inc.
WHITE PAPER: This white paper discusses how you can maintain security and compliance, especially in an area of healthcare IT that's frequently overlooked: Communications.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

8x8, Inc.

Case Study: Earthquake Prompts Manufacturing Company to Protect Its Business
sponsored by Riverbed Technology, Inc.
CASE STUDY: In this case study, you will discover why one company replaced their physical servers with virtual machines and consolidated its servers and storage to optimize their disaster recovery capabilities. Read on to learn how to lower your data center costs with this infrastructure.
Posted: 23 Nov 2015 | Published: 30 Sep 2014

Riverbed Technology, Inc.

Healthcare Data Access Compliance
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Concurrent logins, manual logoffs, password sharing and the lack of unique logins are putting patient records at risk, according to this research paper by IS Decisions.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

ComputerWeekly.com

Add Value to your Business with Mobile Working from Any Device, Anytime, Anywhere
sponsored by Vodafone
WHITE PAPER: Access this white paper to learn about a mobility service that allows your employees to work more efficiently and effectively from anytime, anywhere, on any device – without any constraints. You'll also explore the five key features of this strategy.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

Vodafone
226 - 250 of 2315 Matches Previous Page    8 9 10 11 12 13    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement