IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
26 - 50 of 2380 Matches Previous Page  |  Next Page
Hybrid Cloud & Data Fabric For Dummies
sponsored by NetApp SolidFire
WHITE PAPER: Hybrid clouds are seeing a growth in adoption rates, but we're also seeing data management challenges arise. This guide explores these challenges to the hybrid cloud model and how a data fabric addresses them.
Posted: 09 May 2017 | Published: 31 Dec 2015

NetApp SolidFire

The Investigatory Powers Act 2016 and Internet Connections Records
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
Posted: 09 May 2017 | Published: 09 May 2017

ComputerWeekly.com

MobileIron and iOS: The Security Backbone for the Modern Enterprise
sponsored by MobileIron
WHITE PAPER: Download this white paper to discover an EMM solution that provides a comprehensive platform that protects enterprise information wherever it lives: in the datacenter, in the cloud, in mobile apps, on mobile devices, and in motion between them.
Posted: 09 May 2017 | Published: 09 May 2017

MobileIron

Why Organizations Still Struggle to Digitally Transform & Innovate
sponsored by TechData - Veeam
WHITE PAPER: Over 80% of enterprises deal with a data availability gap. Do you know how many millions that gap is costing you? Access this white paper to learn how to close the availability and protection gaps, quantify your availability goals, see how these challenges are impacting your digital transformation strategies, and more.
Posted: 09 May 2017 | Published: 09 May 2017


Infographic: IoT at Enterprise Scale - 6 Best Practices
sponsored by VMware
RESOURCE: The Internet of Things (IoT) is introducing new challenges to traditional operations environments. Access this infographic to prepare for an onslaught of IoT use cases and refocus your strategy to focus on scale, complexity, and security.
Posted: 08 May 2017 | Published: 08 May 2017

VMware

Computer Weekly – 9 May 2017: Casting the IT skills net wider
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.
Posted: 08 May 2017 | Published: 09 May 2017

ComputerWeekly.com

The 5 Features of an Always On Data Platform
sponsored by DataStax
WHITE PAPER: Access this white paper to learn about the 5 features of an always on data platform. Find out what it takes to achieve always on success, how to handle mixed workloads in real time, and more.
Posted: 08 May 2017 | Published: 08 May 2017

DataStax

Data Center Services: Trust the Professionals
sponsored by Comarch
WHITE PAPER: Whether you have an established data center, or are designing and building one, outsourcing to data center services can help stretch your budget and maximize your ROI. Access this white paper to learn about a data center service provider and IT infrastructure as a service to see how your data center stands to benefit.
Posted: 05 May 2017 | Published: 05 May 2017

Comarch

5 Ways to Boost Mobile Application Security & Craft an Effective Mobile Strategy
sponsored by BlackBerry
EGUIDE: In an era of mobile everything, organizations must adopt mobility strategies to keep up with their on-the-go workforces. However, IT continues to struggle with mobility issues, from security to cost control. Discover 5 ways to boost your mobile application security and learn how to craft the most effective mobility strategy for your organization.
Posted: 04 May 2017 | Published: 27 Apr 2017

BlackBerry

Top Mobile Security Threats IT Needs to Know About
sponsored by BlackBerry
EGUIDE: In an era of mobile everything, mobile security threats are on the rise and security is becoming increasingly important. Discover the top 5 mobile security threats that should be on your radar and the benefits of security solutions like two-factor authentication.
Posted: 04 May 2017 | Published: 27 Apr 2017

BlackBerry

How to Plan for IoT Success: Strategy and Recommendations
sponsored by VMware
WHITE PAPER: The Internet of Things is forcing us to change the way that operations and information technology departments collaborate. Access this white paper to learn how to plan, deploy and manage IoT use cases for tangible, quantifiable benefits.
Posted: 04 May 2017 | Published: 04 May 2017

VMware

Solving the Big Challenges of Big Data Governance
sponsored by TechTarget
RESOURCE: As your organization strives to become more data driven, you need to think more strategically about governing the data you're looking to be driven by. Access our expert guide, Data Governance Points Way to Better Business, to gain a better understanding on what you need to know when implementing or managing a data governance program.
Posted: 03 May 2017 | Published: 18 Mar 2014

TechTarget

The Developer's Guide to the DevSecOps Galaxy
sponsored by Veracode, Inc.
WHITE PAPER: Bringing developers and operations staff together under the singular DevOps roof means trying to mesh contradictory approaches, leaving open security concerns. DevSecOps to the rescue! Access this white paper to learn about DevSecOps challenges, best practices, and more!
Posted: 03 May 2017 | Published: 03 May 2017

Veracode, Inc.

Prevent Full-Blown Breaches with Threat Response and Incident Intelligence
sponsored by Proofpoint, Inc.
WHITE PAPER: The manual tasks it takes to aggregate, organize, and analyze data from all of the key systems and devices on your network can be incredibly time-consuming and can overwhelm security teams with their scope. Discover how to modernize security with threat response and incident intelligence.
Posted: 02 May 2017 | Published: 02 May 2017

Proofpoint, Inc.

Why Cybersecurity's Visibility Gap Matters, and How Organizations Can Solve It
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper explores how to close the cybersecurity visibility gap in an increasingly mobile world. Learn how to see beyond the confines of your network and endpoints to protect your people, brand, and data better.
Posted: 02 May 2017 | Published: 31 Dec 2015

Proofpoint, Inc.

Computer Weekly – 2 May 2017: How to deal with data under GDPR
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.
Posted: 01 May 2017 | Published: 02 May 2017

ComputerWeekly.com

Beware the Beastly Threats of IT security
sponsored by Lenovo
WHITE PAPER: It's essential that IT professionals have the right tools to build safeguards against them as battling threats is more critical for organizations than ever— in dollars and in brand reputation. This eBook explores 6 beastly threats scratching at the perimeter of your company's computers and IT networks, and where these threats are trending.
Posted: 01 May 2017 | Published: 01 May 2017

Lenovo

7 Keys to Unified Data Protection Vendor Evaluation
sponsored by Veritas
WHITE PAPER: Having a unified data protection platform is the way to ensure that your data is both secure and visible. Access this white paper to see gain an understanding of what to look for in a vendor and how two unified data protection vendors compare to each other based on 7 key aspects.
Posted: 27 Apr 2017 | Published: 28 Feb 2017

Veritas

Unified Data Protection Vendor Comparison
sponsored by Veritas
WHITE PAPER: Your data is growing in importance and it needs to be protected no matter which environment it lives in be it virtual, physical, or in the cloud. Access this white paper to see how 2 leading data protection and backup providers compare to one another based on 7 key performance areas.
Posted: 27 Apr 2017 | Published: 30 Dec 2016

Veritas

Vendor Comparison Based on Top 8 Data Protection Needs
sponsored by Veritas
WHITE PAPER: Your data is growing in importance and it needs to be protected no matter which environment it lives in be it virtual, physical, or in the cloud. Access this white paper to see how 2 leading data protection and backup providers compare to one another based on the top 8 data needs.
Posted: 27 Apr 2017 | Published: 31 Oct 2016

Veritas

SaaS Analytics: Safe and Certain Reporting
sponsored by IBM
WHITE PAPER: In this white paper, learn how one multi-national firm was able to maintain Cognos while keeping sensitive data on premises. Plus, discover how 2 more companies were able to access data wherever it resides, create efficiencies and cost savings, and more.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

IBM

The currency of trust: why banks and insurers must make customer data safer and more secure
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

ComputerWeekly.com

What to Consider Before Buying Database Performance Monitoring Tools
sponsored by SearchDataManagement
EBOOK: To help you select the right tool, or tools, to meet your organization's particular database needs, this buyer's handbook offers advice from Mullins on the key features and functions to look for across the different product categories.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

SearchDataManagement

Three Verticals, One Data Backup Solution: A Revolutionary Unified Approach to Data Protection
sponsored by Druva Software
EBOOK: Your organization has evolved to keep up with a rapidly changing business landscape. It's time to renew your data protection strategy. This e-book explores the single, unified data protection platform was implemented in 3 different vertical industries and its impact on each organization.
Posted: 21 Apr 2017 | Published: 21 Apr 2017

Druva Software

How to Manage Oracle E-Business Suite Apps and Databases
sponsored by Data Intensity
ESSENTIAL GUIDE: In this expert e-guide, explore how to simplify and achieve a number of tasks that go into managing Oracle E-Business Suite (EBS) and databases, including patch updates, improving security, and managing cost-based optimizer stats.
Posted: 26 Apr 2017 | Published: 20 Apr 2017

Data Intensity
26 - 50 of 2380 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement