IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
26 - 50 of 2596 Matches Previous Page  |  Next Page
The Pressing Need for Digital Risk Management
sponsored by Digital Shadows
WHITE PAPER: According to ESG research, 69% of organizations are increasing their cybersecurity budgets. This ESP report reveals how CISOs and risk officers can adopt a thorough risk management strategy to protect their enterprise from pressing cyber threats.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

Ensuring Business Continuity for Critical Healthcare Applications
sponsored by Hewlett Packard Enterprise
CASE STUDY: Belgian healthcare provider Practimed's legacy IT environment—a mix of stand-alone servers and storage arrays—had become too costly and risky to maintain and scale. Access this case study to see how Practimed was able to leverage hyperconverged infrastructure to overcome these challenges and more.
Posted: 14 Nov 2017 | Published: 30 Jun 2017

Hewlett Packard Enterprise

Moving your Database to the Cloud
sponsored by Quest
WHITE PAPER: Explore how to move your databases to the cloud as well as what the consequences of that that move are. Deepen your understanding of the cloud, from its elasticity to potential for self-service, and learn about different deployment and service models for the cloud.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Quest

2018 Database DevOps Survey
sponsored by DBMaestro
WHITE PAPER: Inside, uncover key findings from DBmaestro's annual Database DevOps Report, along with the challenges and best practices of companies using or looking to implement DevOps for databases.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

DBMaestro

Top Cyber Threats to the Legal Sector
sponsored by Digital Shadows
WHITE PAPER: Legal firms can be attractive targets for cybercriminals, especially firms working on mergers and acquisitions (M&A), possessing a large amount of sensitive, non-public information. This paper highlights 3 security risks for legal firms to focus on and how to mitigate them.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Top Cybercrime Threats to Financial Institutions
sponsored by Digital Shadows
WHITE PAPER: The most prevalent cybercrime threats against financial institutions are: the use or sale of ATM malware, targeted network intrusions, data breaches and the use of banking Trojans. Take a look at this white paper to learn more about these financial threats that stem from cybercriminals.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Protect Your Customer and Employee Accounts
sponsored by Digital Shadows
WHITE PAPER: Digital Shadows found that 97% of the largest companies in the world had their credentials exposed. Explore this white paper to learn how to mitigate the growing risks of account takeovers and the measures you can take to ensure your organization is better protected.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Direct Sales Organization Modernizes IT Infrastructure
sponsored by Hewlett Packard Enterprise
CASE STUDY: Princess House was plagued with aging IT systems that were becoming increasingly inefficient, risky, and costly. They needed to refresh and streamline their IT infrastructure and boost data protection for mission-critical applications. Read this case study to see how they leveraged hyperconverged infrastructure to meet these challenges.
Posted: 13 Nov 2017 | Published: 30 Jun 2017

Hewlett Packard Enterprise

Security Automation and Orchestration Best Practices
sponsored by ServiceNow
WEBCAST: According to a recent Forrester Research Survey, 68% of respondents state that using automation and orchestration tools to improve security operations is a high or critical priority. Watch this webcast to gain insight into security automation and orchestration (SAO) best practices and a roadmap for deployment.
Posted: 13 Nov 2017 | Premiered: Nov 13, 2017

ServiceNow

Controlling and Managing Privileged Access
sponsored by One Identity
WHITE PAPER: According to a Black Hat Report, 32% of hackers say accessing privileged accounts is the easiest and fastest way to get at sensitive data. This white paper explores the risks associated with privileged accounts and offers strategic risk mitigation tactics you can take to ensure security.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

One Identity

CW ASEAN – November 2017: How managed security services help to reduce cyber risk
sponsored by ComputerWeekly.com
EZINE: In this month's issue of CW ASEAN, read more about the pros and cons of using managed security services and considerations you should be aware of.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

ComputerWeekly.com

Cloud Services and DRaaS Case Study
sponsored by Peak10
CASE STUDY: When Louisiana-Pacific Corporation transitioned to a new enterprise resource planning environment, they moved their data center from on-site to the cloud with the help of a secure partner. Read this case study to see how this manufacturing leader benefited from leveraging cloud services.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

Peak10

Equifax Breach: Lessons Learned for Your Organization
sponsored by Digital Shadows
WHITE PAPER: The Equifax data breach potentially affected 143 million individuals in the US, Canada and the UK. Inside, gain insight into the impacts of the Equifax Breach, 6 lessons learned from the breach, and how your enterprise can mitigate the risks of falling victim to such a devastating data breach.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

Digital Shadows

Belgian IT Company Simplifies Operations and Soups Up Performance
sponsored by Hewlett Packard Enterprise
CASE STUDY: Simac, a Belgian IT solutions integrator and service provider, had a legacy data center that had become too costly and complex to manage and scale. Access this case study to see how they were able to leverage hyperconverged infrastructure to improve their business.
Posted: 10 Nov 2017 | Published: 30 Jun 2017

Hewlett Packard Enterprise

Dutch Service Provider Gets a Total IT Refresh from the Ground Up
sponsored by Hewlett Packard Enterprise
CASE STUDY: Syntrophos provides high-quality information and communication technology, geo-information, and consulting services to over 120,000 citizens. Read this case study to learn how adopting a hyperconverged infrastructure enabled them to address these issues and refresh their IT infrastructure to support Tier-1 applications.
Posted: 10 Nov 2017 | Published: 30 Jun 2017

Hewlett Packard Enterprise

Need More Oomph from Oracle
sponsored by Oracle & Explorer
WHITE PAPER: Find out how to control Oracle costs better while improving database performance by learning how to conduct an Oracle Architecture Review.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

Oracle & Explorer

BitLocker - A Strong First Step in Data Security
sponsored by WinMagic
WHITE PAPER: According to Crowd Research Partners' BYOD and Mobile Security Spotlight Report, 43% of respondents say device encryption is currently a part of their mobile device management policy. Learn how you can manage BitLocker from a single security window to protect data residing across desktops, mobile devices, and more.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

WinMagic

Securing Business Information with Box
sponsored by Box
WHITE PAPER: Discover how to centralize control over content and collaboration in a way that facilitates productivity without sacrificing security and learn about Box's content management platform.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

Box

A Comprehensive Guide to the Data Catalog
sponsored by Collibra
RESOURCE: Data is a valuable business asset with the potential to transform almost every aspect of the enterprise. To articulate business benefits, data catalogs can help organizations tap into the real value that data provides. Evaluate if you need a data catalog and how you can get started.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

Collibra

BitLocker Security Enhanced
sponsored by WinMagic
WHITE PAPER: Most enterprises don't operate on only one security platform, so why rely solely on one native encryption posture to manage your risks? Explore this solutions brief to see if the implementation of SecureDoc combined with your existent Microsoft BitLocker is right for your enterprise's security needs.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

WinMagic

Migrating IT In-house Boosts Management and Control with HCI
sponsored by Hewlett Packard Enterprise
CASE STUDY: When Namibia Institute of Pathology Limited brought their IT in-house, they needed a high-power data center. This case study explores how they implemented a hyperconverged infrastructure that helped them acquire brand-new disaster recovery, backup, and single-pane management capabilities.
Posted: 09 Nov 2017 | Published: 31 Aug 2017

Hewlett Packard Enterprise

CloudVM
sponsored by WinMagic
WHITE PAPER: Don't defer the responsibility of protecting your enterprise – take responsibility for protecting your data and workloads in the cloud. Take a look at this technology overview to see if SecureDoc CloudVM is the right approach for your enterprise's cloud data protection and encryption needs.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

WinMagic

6 GDPR Compliance Pitfalls & How to Avoid Them
sponsored by Collibra
WHITE PAPER: The GDPR is a complex regulation. And on the path to compliance, there will be unanticipated roadblocks. The good news is, you can find your way through them.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

Collibra

Managing BitLocker in the Enterprise with SecureDoc
sponsored by WinMagic
WHITE PAPER: Microsoft offers built-in encryption software known as BitLocker, and it is designed to protect data. But how do you simplify BitLocker management? Explore this technology brief to discover if the combination of SecureDoc and BitLocker is right for your encryption and data protection needs.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

WinMagic

Balancing Security and Flexibility for Collaboration
sponsored by Box
WHITE PAPER: Explore the most pressing challenges facing secure collaboration as well as the top reasons employees turn to consumer tools in the workplace. Learn how to enable truly secure, centralized collaboration in the cloud that restores IT's control and delivers positive user experiences for employees.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

Box
26 - 50 of 2596 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement