IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
26 - 50 of 2271 Matches Previous Page  |  Next Page
Ten Areas Where XenApp Outperforms VMware Horizon Apps
sponsored by Citrix
WHITE PAPER: In this white paper, you will discover the best-in-class features of one application virtualization platform, and compare its features to market equivalents. Read on to ensure virtualization solutions deliver rich experience for your users and comply with security regulations.
Posted: 02 Feb 2016 | Published: 31 Aug 2015

Citrix

Prevent Cybercriminals from Taking Down your Business
sponsored by Microsoft
WHITE PAPER: This infographic reveals what companies are doing right (and wrong) in their security initiatives, and what it's costing them. Uncover technologies that not only build bigger walls against attacks, but also lock criminals out altogether.
Posted: 02 Feb 2016 | Published: 02 Feb 2016

Microsoft

Enterprise Scenarios for Database Security Tools and IBM Guardium
sponsored by IBM
EGUIDE: This eGuide discusses some classic use cases and ways organizations often use security add-ons to boost database security.
Posted: 02 Feb 2016 | Published: 31 Dec 2015

IBM

Optimize Your Backup and Data Recovery
sponsored by Commvault
RESOURCE CENTER: In this interactive resource, discover tactics for modernizing backup and recovery strategies to ensure your systems keep pace as data explosion continues into the coming years. You will also gain access to checklists, e-books, videos and more that can enable your enterprise to better protect, manage, and gain business value from your data.
Posted: 02 Feb 2016 | Published: 31 Dec 2015

Commvault

Are Energy and Utilities at Risk of a Major Breach?
sponsored by BitSight
WHITE PAPER: This white paper discusses the security performance of six key industry sectors.
Posted: 02 Feb 2016 | Published: 30 Sep 2015

BitSight

40 Questions You Should Have in Your Vendor Security Assessment
sponsored by BitSight
WHITE PAPER: In this white paper, you will learn how to get started with your VRM security program and by accessing the most important questions to ask third-party businesses.
Posted: 02 Feb 2016 | Published: 30 Apr 2014

BitSight

Why “Store Everything” Isn’t a Strategy for Information Governance
sponsored by Veritas
RESOURCE CENTER: This brief article overviews an information governance solution that manages fast-growing data volumes without requiring more capital expenditures for storage hardware or needing armies of storage administrators. Read on to see how you can improve your enterprise's storage management with a solution that provides real-time information insight.
Posted: 02 Feb 2016 | Published: 02 Feb 2016

Veritas

Digital Guardian Data Loss Prevention
sponsored by Digital Guardian
WHITE PAPER: Continue reading this white paper to discover how you can gain the deepest visibility, fine-grained control and the industry's broadest data protection coverage
Posted: 02 Feb 2016 | Published: 31 Dec 2015

Digital Guardian

Digital Guardian for Data Protection and Export Control Compliance
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will learn about context-aware protection and its capability to address a wide range of real-world cases for export controlled products and services.
Posted: 02 Feb 2016 | Published: 31 Dec 2015

Digital Guardian

Under Attack? 2016 Defenses Escape Compromise
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.
Posted: 01 Feb 2016 | Published: 01 Feb 2016

SearchSecurity.com

Executives Wise Up to Cloud Financial Apps
sponsored by SearchFinancialApplications
EBOOK: In this three-part handbook, experts give advice on how to make the move to cloud-based financial applications and offer examples of the best functions to move to the cloud.
Posted: 01 Feb 2016 | Published: 28 Feb 2016

SearchFinancialApplications

All Stars Panel: Healthcare Security Spotlight
sponsored by Optum
VIDEO: This video of four IT professional explores the top security priorities and projects being grappled with in health IT today, and the strategies that you can adopt to keep your information safe from breach.
Posted: 01 Feb 2016 | Premiered: 22 Jan 2016

Optum

Best Practices For Public Cloud Security
sponsored by TrendMicro
WHITE PAPER: This white paper discusses the need for cloud managers to balance developer time-to-value with security risks and cost.
Posted: 01 Feb 2016 | Published: 04 Feb 2015


Gartner: Magic Quadrant for Mobile Data Protection
sponsored by Digital Guardian
WHITE PAPER: Continue reading this white paper to discover treat data encryption protection as a standard for all workstations.
Posted: 01 Feb 2016 | Published: 19 Oct 2015

Digital Guardian

Gartner Report: Best Practices for Detecting and Mitigating Advanced Persistent threats
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will learn how to implement specific strategic best practices to detect and mitigate persistent threats and target malware.
Posted: 01 Feb 2016 | Published: 04 May 2015

Digital Guardian

Smart Access Policies Are Key to Protecting Organizational Secrets
sponsored by Veritas
RESOURCE CENTER: In this article, you will learn how to restrict inappropriate access from hackers, malware and seemingly innocent attempts to use data services by unauthorized users.
Posted: 01 Feb 2016 | Published: 16 Dec 2015

Veritas

5 Ways Your Vendor Risk Management Program Leaves You in the Dark
sponsored by BitSight
WHITE PAPER: In this white paper, you will learn the steps it takes to protect your data and implement a solid vender risk management (VRM) program.
Posted: 29 Jan 2016 | Published: 02 Dec 2015

BitSight

Big Data Management: One Fast Query on All Your Data
sponsored by Oracle Corporation
VIDEO: Access this video to learn about a big data management strategy that can work seamlessly with Hadoop and NoSQL. Discover a way to gain access to a much bigger pool of data and maintain security, all for a lower TCO than building your own cluster.
Posted: 29 Jan 2016 | Premiered: 19 Nov 2014

Oracle Corporation

Gartner Competitive Landscape: Endpoint Detection & Response (EDR)
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will examine critical EDR customer buying behaviors, solution use cases and technologies that product managers and marketing professionals must consider.
Posted: 29 Jan 2016 | Published: 26 Nov 2014

Digital Guardian

Gartner Competitive Landscape: Data Loss Prevention Market 2015
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will learn the main drivers of DLP adoption and the future of the DLP industry as a whole.
Posted: 29 Jan 2016 | Published: 22 Oct 2015

Digital Guardian

Information Governance Audit: 5 Steps You Should Take
sponsored by Veritas
RESOURCE CENTER: Access this article to learn how to better perform security audits and keep your IT environment safe and secure.
Posted: 29 Jan 2016 | Published: 30 Dec 2015

Veritas

Using Information Governance to Mitigate Risk
sponsored by Veritas
RESOURCE CENTER: In this article, discover how you can enact policies and take initiatives centered on identifying, avoiding, eliminating and ameliorating the impact of risk on your organization.
Posted: 29 Jan 2016 | Published: 23 Dec 2015

Veritas

Data Lake Architecture Concerns: Cost, Durability, and Security
sponsored by Cambridge Semantics
EGUIDE: This e-guide uncovers expert insight on data lakes and how data virtualization and federation can help enterprises maintain data durability and security. Learn how these tools can help your enterprise better manage and analyze information in your data lake.
Posted: 29 Jan 2016 | Published: 30 Apr 2015

Cambridge Semantics

5 Steps to Achieve Risk-based Application Security Management
sponsored by IBM
WHITE PAPER: This white paper will show you how to make applications security a strategically managed process.
Posted: 29 Jan 2016 | Published: 31 Jul 2015

IBM

The State of Mobile Application Security (4th Edition)
sponsored by IBM
WHITE PAPER: This white paper will give you the latest statistics of online piracy and show you what you can do to protect your IP.
Posted: 29 Jan 2016 | Published: 10 Dec 2015

IBM
26 - 50 of 2271 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement