IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
26 - 50 of 2620 Matches Previous Page  |  Next Page
Get Your Apps Back in Business
sponsored by Dell Software
WHITE PAPER: Discover a cloud-era data protection solution that combines rapid snap technology and recovery repository to back up, replicate, verify, and restore your data anywhere. Read on and explore how you can eliminate downtime and protect your critical workloads with this single, unified solution.
Posted: 13 Jul 2016 | Published: 31 Dec 2015

Dell Software

4 Cybersecurity Trends that Might Be Affecting Your Organization
sponsored by Navex Global
ANALYST REPORT: In this blog post, you'll learn 4 top cybersecurity trends that could be affecting your organization. Discover which attacks to look out for in the near future, and learn how businesses have come to rely on compliance programs to ensure that their organizations operate properly.
Posted: 13 Jul 2016 | Published: 04 May 2016

Navex Global

Securing Oracle Database 12c
sponsored by Oracle Corporation
WEBCAST: Discover how to handle attacks on your Oracle Database with preventive, detective, and administrative security controls, as well as how to employ a stratified data protection strategy. Also find out how Epsilon takes care of their data—both to improve business for its customers but also in the sense of database performance, security, and reporting.
Posted: 13 Jul 2016 | Premiered: Dec 31, 2015

Oracle Corporation

Can Secure Cloud Storage Solve the Long-Term Archiving Dilemma?
sponsored by Iron Mountain
WHITE PAPER: Explore the cloud-based archive solutions market, and discover the benefits of object storage as flexible software construct for digital archives. Together, cloud services and object storage can provide your enterprise with the ability to leverage an object storage repository without building a large infrastructure for it.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Iron Mountain

The Data Protection Playbook For Converged Storage
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Your data is indispensable, with zero tolerance for downtime and a need for anytime, anywhere access. Read this paper to discover four key considerations for evaluating enterprise data protection, backup, and recovery in converged systems. View a converged storage alternative that leverages the latest backup and recovery technology.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Hewlett Packard Enterprise

Pairing SuccesFactors with a HCM Suite to Introduce Innovation to HR Operations
sponsored by Accenture
WHITE PAPER: Explore how SAP SuccessFactors users can leverage a modern HCM suite to enhance productivity, reduce costs, improve HR operations, transfer data sets securely between systems in the cloud, and more.
Posted: 13 Jul 2016 | Published: 31 Dec 2015

Accenture

Lightning-Fast Virtual System Recovery
sponsored by arcserve
WEBCAST: Discover a unified data protection solution with instant, efficient virtual machine recovery and migration capabilities and watch a demonstration on how this solution works. Explore how this virtual system backup can provide your enterprise with improvements in RPO, RTO, database performance, and more.
Posted: 12 Jul 2016 | Premiered: May 20, 2016

arcserve

Best Practices for Oracle Database High Availability and Data Protection
sponsored by Oracle Corporation
WEBCAST: Hear from Bill Callahan, Director and Principal Engineer of CCC Information Services, Inc. about integrated hardware and software from Oracle that can reduce the cost and complexity of HA, eliminate data loss, increase ROI, and more.
Posted: 12 Jul 2016 | Premiered: Dec 31, 2015

Oracle Corporation

Case Study: Defending Mobile Apps from Attacks
sponsored by Arxan
WHITE PAPER: Discover how a leading medical device manufacturer hardened their application protection strategy to allow physicians to securely read and monitor patient data, as well as securely control medical devices using mobile applications. Learn how you can gain similar security benefits for your own applications.
Posted: 12 Jul 2016 | Published: 01 Jun 2016

Arxan

Major Global Bank Secures Their Mobile Applications
sponsored by Arxan
CASE STUDY: Learn how a major global banking leader was able to pave the way for mobile banking security to protect critical cryptography and authentication routines in their app that manages communication with the banking server.
Posted: 12 Jul 2016 | Published: 01 Jun 2016

Arxan

Six Steps to a Better Security Strategy
sponsored by Armor
ANALYST REPORT: This Forrester report provides you six essential steps to create an effective security strategy linked with key business interests and success factors.
Posted: 12 Jul 2016 | Published: 01 Jun 2016

Armor

Stop Future Threats though Careful Examination of the Malware Lifecycle
sponsored by Check Point Software Technologies Ltd.
EGUIDE: This e-guide takes a look at the malware lifecycle and explores how advanced attacks have evolved. Learn how specific advanced attacks work and how you can benefit from studying malware lifecycles to detect and defend against future attacks.
Posted: 11 Jul 2016 | Published: 08 Jul 2016

Check Point Software Technologies Ltd.

Infographic: 2016 Cybersecurity Report
sponsored by IBM
WHITE PAPER: Get insight into recent cybersecurity incidents and beyond in this short infographic. Learn what security events occurred most prevalently in 2015 and what you can do to protect your organization moving forward.
Posted: 11 Jul 2016 | Published: 01 Jun 2016

IBM

HIPAA Compliance & Risk Management
sponsored by Armor
WHITE PAPER: Develop a proactive strategy to circumvent security problems before they occur. Learn the latest HIPAA regulation requirements to improve internal procedures and reduce threats. Understand the possible threats and formulate policies on how to protect data while conforming to the necessary regulations.
Posted: 11 Jul 2016 | Published: 31 Dec 2015

Armor

Are You a Security-First Organization?
sponsored by Armor
WHITE PAPER: Regulations are not intended to tell businesses how to structure their security efforts, they are intended to be used as a guide against which the chosen security structure can be checked. Learn how to better structure your security posture to actually protect your assets rather than just looking like you're protecting them.
Posted: 11 Jul 2016 | Published: 01 Jun 2016

Armor

See How Apps are Being Hacked
sponsored by Arxan
WEBCAST: This webcast illustrates some of the ways hackers are breaking into your mobile applications. See real life examples of how mobile app hacking is becoming easier and faster than ever before.
Posted: 11 Jul 2016 | Premiered: Jun 1, 2016

Arxan

Case Study: Outwood Grange Academics Trust Ensures Teaching Continuity with UDP
sponsored by arcserve
CASE STUDY: Explore one organization's decision to deploy a Unified Data Protection (UDP) solution to streamline and protect their diverse IT infrastructure and backup tools. By implementing this UDP system, your enterprise can reduce your backup windows and storage needs, achieve longer data retention times, and more.
Posted: 11 Jul 2016 | Published: 31 Dec 2015

arcserve

How Automation Provisions and Maintains Physical, Virtual, and Cloud Servers
sponsored by BMC
DATA SHEET: Find out how you can accelerate vulnerability resolution, lower costs of remediation, and avoid major security incidents with automated management, control, and enforcement of server configuration changes in the data center and cloud.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

BMC

Protected Health Information Data Breach Report
sponsored by Verizon
RESEARCH CONTENT: Put PHI security under the microscope to help you identify threats and mitigate risks to your medical records, by accessing this exclusive "Protected Health Information Data Breach" report. Additionally, examine the top three threats that account for 73% of all healthcare data security incidents to protect your customer trust.
Posted: 08 Jul 2016 | Published: 31 Dec 2015

Verizon

Stay One Step Ahead of Cyber Attacks
sponsored by Verizon
VIDEO: Discover a "Data Breach Investigations Report" that provides organizations with information needed to prevent attacks, quickly detect breaches, and reduce damage. Access now and get the cybersecurity intelligence necessary for successful protection.
Posted: 07 Jul 2016 | Premiered: 27 Apr 2016

Verizon

Best Practices for Monitoring Today's Murky Threat Environment
sponsored by Hewlett Packard Enterprise
EGUIDE: In today's murky threat environment, even cybersecurity firms are vulnerable to attack – proving that there is no such thing as "100% secure." Access this e-guide for tips from security expert Michael Cobb to help you prepare for a security vendor hack. Plus, learn the latest network monitoring means for rooting out fast-moving malicious actors.
Posted: 07 Jul 2016 | Published: 24 Jun 2016

Hewlett Packard Enterprise

Data Science Roles and Industries Infographic
sponsored by IBM
RESOURCE: This infographic helps you see how the different members of the data science team perform the necessary actions associated with analytics. Learn how building a strong team can improve insights in a variety of industries, ranging from education to banking and finance.
Posted: 07 Jul 2016 | Published: 07 Jul 2016

IBM

9 steps to build a better insider threat program
sponsored by Forcepoint
WEBCAST: While your IT system can be a witness, victim or enabler, insider threats are more than a technology problem. Policy, process, controls, risk management, auditing and monitoring all play critical roles in managing this invisible vulnerability. Watch this webcast to learn about managing and mitigating insider threats within your organization.
Posted: 06 Jul 2016 | Premiered: Jun 1, 2016

Forcepoint

State of Application Security Report
sponsored by Arxan
WHITE PAPER: You know why mobile apps must be secure, now learn why in this white paper. It provides recommendations for how organizations and consumers can minimize the risk of their mobile apps being hacked and how app developers can improve protection.
Posted: 05 Jul 2016 | Published: 01 Jun 2016

Arxan

Advantages vs. Disadvantages of Taking a "Hack Back" Approach to Cyber Crime
sponsored by Hewlett Packard Enterprise
EGUIDE: This e-guide discusses hacking back as a viable option to combat hacking attempts. Expert Kevin Beaver discusses the merits and drawbacks of an "offense is the best defense" approach to security and how to implement more permanent security tools moving forward.
Posted: 07 Jul 2016 | Published: 24 Jun 2016

Hewlett Packard Enterprise
26 - 50 of 2620 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement