IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
26 - 50 of 2549 Matches Previous Page  |  Next Page
A 5 Minute Guide to Security for Cognitive Search and Knowledge Management
sponsored by Attivio, Inc.
WHITE PAPER: Examine the resurgence of knowledge management, in conjunction with cognitive search and security, as a viable option for coordinating the vast amounts of information buried in big data environments.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

Attivio, Inc.

Focus: Datacentre Uptime
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we take a closer look at some high-profile datacentre outages of recent times and assess the toll they took on the companies involved, and look into what providers and consumers can do to protect themselves from downtime.
Posted: 12 Sep 2017 | Published: 12 Sep 2017

ComputerWeekly.com

Get Your Company GDPR-Ready: Research Study Results
sponsored by CA Technologies.
WEBCAST: The General Data Protection Regulation (GDPR) is bringing new rules and penalties for the misuse or loss of personal data. Explore the results of this Vanson Bourne research study to learn about the impacts of the GDPR, steps you can take to ready your company, enterprises' plans to purchase tools and adopt new data strategies, and more.
Posted: 12 Sep 2017 | Premiered: Sep 6, 2017, 01:01 EDT (05:01 GMT)

CA Technologies.

SQL Server 2017 on Linux: Top 6 Reasons Companies Make the Move
sponsored by Microsoft
WHITE PAPER: Find out how to deploy SQL Server 2017 on Linux with whatever language, platform, and on-premise or cloud deployment that suits your organization's needs best.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Microsoft

GDPR: The State of Play
sponsored by ComputerWeekly.com
DATA SHEET: An infographic to inform the reader of what GDPR is, how it will affect them, and when it will come into play.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

ComputerWeekly.com

GDPR Compliance: The Implications for Test Data Management
sponsored by CA Technologies.
WHITE PAPER: Learn about the key implications of GDPR regulations for test data management and explore topics like data masking, synthetic data generation, and more.
Posted: 11 Sep 2017 | Published: 31 Dec 2016

CA Technologies.

Ready, Set, Go: General Data Protection Regulation (GDPR)
sponsored by CA Technologies.
WEBCAST: With the General Data Protection Regulation (GDPR) looming in the very near future, it's extremely important to know what it is, how you can comply, and how it may affect you. In this webinar, explore recommendations by CA Technologies that can help you prepare for the GDPR's arrival.
Posted: 11 Sep 2017 | Premiered: Sep 6, 2017

CA Technologies.

What Does The GDPR Mean To You? How To Improve Your Testing And Keep Your Test Data Compliant
sponsored by CA Technologies.
WEBCAST: Data breaches are almost an everyday event – but the upcoming General Data Protection Regulation (GDPR) forces you to think differently about data breaches and how they impact your software development and testing process. Learn what you can do to avoid compromising your test data, and how CA Test Data Manager can help.
Posted: 11 Sep 2017 | Premiered: Sep 6, 2017

CA Technologies.

Trust Must Be the Foundation of Your B2B Digital Ecosystem
sponsored by IBM
WHITE PAPER: Successful management of your digital business and ecosystems is not founded on technology, but trust. This 19 page Forrester report explores the fundamental role that trust plays in your digital transformation, focusing on the role of trust in the business-to-business context.
Posted: 11 Sep 2017 | Published: 29 Mar 2017

IBM

How SQL Server 2016 Measures Up: Business Value, Database Performance, and Security
sponsored by Microsoft
RESEARCH CONTENT: Uncover Crimson Consulting's findings about the potential business value of Microsoft SQL Server 2016 and how it performs when it comes to high speed analytics, database security, big data, cloud integration, and beyond.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Microsoft

GDPR Compliance: How Can You Adapt to the New Regulation?
sponsored by CA Technologies.
WHITE PAPER: The General Data Protection Regulation (GDPR) is set to begin in May 2018 – is your organization ready to comply? Learn from a technology perspective what's needed to comply with the GDPR. Topics covered include data breach reporting, accountability, rights and more.
Posted: 08 Sep 2017 | Published: 08 Sep 2017

CA Technologies.

GDPR Is A State of Mind: Research Report
sponsored by CA Technologies.
RESEARCH CONTENT: The European General Data Protection Regulation (GDPR) is coming – fast. In this Computing Research report, learn how 115 UK business decision-makers in large enterprises feel about the upcoming GDPR and how these concerns relate to everyday issues of storage, security and software development.
Posted: 08 Sep 2017 | Published: 01 Jun 2017

CA Technologies.

Enterprise-class Big Data for Data Analytics
sponsored by Virtustream
WHITE PAPER: Big data has been a big mystery for a long time, but the fog is starting to lift. In this white paper, you will find everything you need to use the cloud to leverage big data.
Posted: 08 Sep 2017 | Published: 08 Sep 2017

Virtustream

CW Europe – September-November 2017
sponsored by ComputerWeekly.com
EZINE: In this quarter's CW Europe, read about a political crisis in Balkan state with tech at its centre. The country has been accused of using surveillance technology for covert spying. Protests related to this were instrumental in the ruling party losing power after 10 years.
Posted: 07 Sep 2017 | Published: 07 Sep 2017

ComputerWeekly.com

Accelerate Workflows with a Secure Digital Workspace
sponsored by Citrix
WHITE PAPER: Digital workspaces are transforming the healthcare industry by delivering secure access to apps, desktops, data, and services from any device, over any network, to allow freedom and flexibility for employees. Download this white paper to see how your organization can also benefit from additional components of a digital workspace.
Posted: 07 Sep 2017 | Published: 07 Sep 2017

Citrix

Getting Ready for the EU General Data Protection Regulation
sponsored by Ivanti
WEBCAST: The EU General Data Protection Regulation (GDPR) set to be effective May 25th 2018, involves many new regulatory compliance initiatives that organizations must be aware of. Download this webcast for answers to critical questions around the GDPR.
Posted: 07 Sep 2017 | Premiered: Sep 13, 2017

Ivanti

Cybersecurity Threats are on the Rise
sponsored by LogMeIn, Inc.
RESOURCE: Over 90% of cyber incidents can be prevented with the right tools. Take a look at this infographic to uncover statistics regarding password use to protect your company from costly cyberattacks.
Posted: 06 Sep 2017 | Published: 06 Sep 2017

LogMeIn, Inc.

Does your Company have a Kill Switch?
sponsored by LogMeIn, Inc.
WHITE PAPER: Without a kill switch, there's no way to know you've secured your fortress. Read this white paper to uncover why your company should implement a password manager to protect your team's data.
Posted: 06 Sep 2017 | Published: 06 Sep 2017

LogMeIn, Inc.

Unpredictable Humans - Still the weakest link in data security
sponsored by Code42
WEBCAST: 78% of security professionals say the biggest threat to endpoint security is negligent or careless employees who do not follow security policies. Watch this webinar to uncover strategies on how to protect your enterprise while moving data around on mobile devices.
Posted: 05 Sep 2017 | Premiered: Sep 5, 2017

Code42

6 Steps to Implementing a Risk-Based Security Approach
sponsored by Dell SecureWorks
WHITE PAPER: It is difficult to defend against something when you do not know what exactly you are defending against. Take an in-depth look at this white paper to uncover 6 steps to implementing a risk-based security approach to enhance your security posture.
Posted: 05 Sep 2017 | Published: 31 Dec 2016

Dell SecureWorks

EU GDPR Compliance Puts Focus on Data Tracking, Encryption
sponsored by Ivanti
EGUIDE: In this e-guide, experts explain why data tracking, encryption and other measures are crucial for GDPR compliance.
Posted: 05 Sep 2017 | Published: 31 Aug 2017

Ivanti

Quantifying the Value of Time in Cyber-Threat Detection and Response
sponsored by Dell SecureWorks
RESEARCH CONTENT: Read this Aberdeen Group report to uncover findings that reveal how to keep up with the complexity of threat and vulnerability landscape by responding to singular threat actors.
Posted: 05 Sep 2017 | Published: 31 Jan 2017

Dell SecureWorks

Australian Privacy Act 1988 Amendment Explained
sponsored by Dell SecureWorks
WHITE PAPER: The amendments to the Privacy Act 1988 are going to force sweeping changes to the attitude around cybersecurity in Australia. This white paper explains who these amendments affect and what they mean for you.
Posted: 05 Sep 2017 | Published: 31 Dec 2016

Dell SecureWorks

Data Protection: Why Cloud is the Future
sponsored by Druva Software
RESEARCH CONTENT: In this ESG research report, analysts reveal security considerations for using cloud-based data protection.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Druva Software

Step Up Your Security and Privacy with Data Masking
sponsored by Delphix
WEBCAST: For many organizations, the most confidential information exists in some of the least-secure environments. Learn why data masking is an effective approach to protecting sensitive environments from a variety of threats. Discover challenges and best practices for implementing data-masking tools, and more.
Posted: 07 Sep 2017 | Premiered: Aug 28, 2017

Delphix
26 - 50 of 2549 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement