IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
26 - 50 of 2379 Matches Previous Page  |  Next Page
Become a Champion of PCI Compliance by Minimizing Your Attack Surface
sponsored by Centrify Corporation
PRODUCT DEMO: Don't miss your chance to download a free trial of a privileged identity management tool that will help you meet the latest PCI DSS regulatory requirements. Access now to receive guidance on the best deployment option for your business needs, technical support for the duration of the evaluation process, and more.
Posted: 28 Jun 2017 | Premiered: 28 Jun 2017

Centrify Corporation

6 Best Practices: Privileged Access Security for AWS
sponsored by Centrify Corporation
WHITE PAPER: This e-book dives into the top 5 security myths surrounding AWS. You will learn about the privileged access security model, why maintaining your current security and compliance is slowing down cloud adoption, and more.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation

Protect Against Cyberattacks and Data Breaches with Multi-Factor Authentication
sponsored by Centrify Corporation
PRODUCT DEMO: Access this free trial of multi-factor authentication (MFA) to add an additional layer of security, beyond passwords, to your enterprise, across apps, endpoints and infrastructure. Here, learn how to stop in progress attacks that leverage compromised credentials when users elevate privilege, and more.
Posted: 28 Jun 2017 | Premiered: 28 Jun 2017

Centrify Corporation

Stop The Breach: Reduce The Likelihood Of An Attack Through An IAM Maturity Model
sponsored by Centrify Corporation
RESEARCH CONTENT: Forrester Research investigated the connection between increased adoption of identity and access management (IAM) best practices and reducing the likelihood of experiencing a security breach. Uncover their key findings to learn more about the efficacy of different IAM approaches and technologies.
Posted: 28 Jun 2017 | Published: 28 Feb 2017

Centrify Corporation

Air-Gap, Isolated Recovery, and Ransomware: Cost vs. Value
sponsored by Rubrik
WHITE PAPER: Have you been thinking about air-gapping your infrastructure with scheduled updates to protect against ransomware? Download this resource to examine a thorough profile detailing isolated recovery—including its limitations—and determine its effectiveness in confronting undetected ransomware file encryption.
Posted: 26 Jun 2017 | Published: 26 Jun 2017

Rubrik

Big Pharma, Healthcare, Biotech & Life Sciences: How Are These Industries Handling Big Data?
sponsored by Unisys
RESEARCH CONTENT: According to new research, 215 executives and IT professionals in the pharmaceutical industry reveal that big data has become a key priority. But organizations must take time to fulfill the potential of large data sets and ensure cyber security. Uncover how big pharma is using big data, and how they're overcoming associated challenges.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

Unisys

Top 7 Reasons to Optimize Network Security with a Security Delivery Platform
sponsored by Gigamon
EBOOK: Uncover the top 7 reasons to optimize your network security model with a security delivery platform, ranging from evolving attacks like malware-as-a-service to the rise of SecOps.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

Gigamon

Sungard AS Data Protection Customer Case Study
sponsored by Dell EMC and Intel®
CASE STUDY: Explore how Sungard AS implemented a scalable data protection infrastructure that enables faster backups and disaster recoveries. Find out how they created a "Protect My Data" managed data vaulting service, expanded protection storage for virtually any app, improved deduplication and backups, and more.
Posted: 16 Jun 2017 | Published: 31 Dec 2016

Dell EMC and Intel®

TIBCO Spotfire Server Overview
sponsored by TIBCO Software Inc.
VIDEO: With its role-based access permissions, TIBCO Spotfire incorporates data discovery, data wrangling, and predictive analytics into a cohesive platform. Learn how to leverage a variety of key resources and services that scale.
Posted: 16 Jun 2017 | Premiered: 21 Feb 2017

TIBCO Software Inc.

Top 10 Reasons Why Dell EMC Data Domain is the Industry Leading Protection Storage
sponsored by Dell EMC and Intel®
WHITE PAPER: Dell EMC Data Domain is one of the industry's leading data protection and storage platforms, but what are the factors that truly differentiate it from the other options on the market? Uncover 10 reasons why Data Domain is standout protection storage.
Posted: 15 Jun 2017 | Published: 31 Dec 2016

Dell EMC and Intel®

Top Reasons to Choose Dell EMC Data Protection Over HPE
sponsored by Dell EMC and Intel®
WHITE PAPER: Find out how to achieve truly scalable, cost-effective data protection and backup. Plus, discover 8 reasons to consider Dell EMC data protection when building your strategy for securing data in cloud and virtual environments.
Posted: 14 Jun 2017 | Published: 31 Dec 2016

Dell EMC and Intel®

Analyzing the Malware Threat
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Find out how malware is evolving to circumvent commonly used defensive measures by learning to avoid behavior detection. Learn more about how this advanced malware functions, how to identify it, and how to neutralize it with cloud generation malware analysis.
Posted: 14 Jun 2017 | Published: 28 Feb 2017

Symantec & Blue Coat Systems

The App is the Endpoint
sponsored by Blue Cedar
WHITE PAPER: Uncover 5 fundamental reasons why security leaders are moving away from a device management paradigm and instead are focusing on treating the app as the endpoint.
Posted: 14 Jun 2017 | Published: 31 Dec 2016

Blue Cedar

Information Protection in the Web and Cloud Era
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This white paper explores the challenges associated with protecting data in today's enterprise. Discover how a modern data loss prevention (DLP) strategy , delivered as part of a cloud-based web security gateway, can provide continuous protection of sensitive data.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

Symantec & Blue Coat Systems

Compliance: The 'Privacy By Design' Approach To Secure Personal Data
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how implementing security best practices with "Privacy by Design" built-in will make businesses more prepared while reducing risks and costs. Plus, discover 6 recommendations for organizations that have to comply with GDPR.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

Symantec & Blue Coat Systems

A Computer Weekly Buyer's Guide to EU General Data Protection
sponsored by ComputerWeekly.com
EBOOK: The race is on to get ready for GDPR next year. In this 16-page buyer's guide, Computer Weekly looks at how to deal with data under the regulation, how compliance will affect businesses, and what organizations should do to prepare.
Posted: 12 Jun 2017 | Published: 30 May 2017

ComputerWeekly.com

Computer Weekly – 13 June 2017: Tips for buying hyper-converged systems
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the growing market for hyper-converged infrastructure, and assess the options available. We ask mature users of the cloud what's next for their migration to off-premise systems. And we analyse how retail supply chains are developing to keep up with online and mobile shopping trends.
Posted: 12 Jun 2017 | Published: 13 Jun 2017

ComputerWeekly.com

IoT in Retail: Engaging the Connected Customer
sponsored by SAS
RESEARCH CONTENT: Discover how retailers can optimize their management of IoT data to anticipate customer needs and engage them where they choose to connect – mobile, in-store, or online. Find out how to update your analytics strategy to handle IoT volumes in order to generate insights that empower you to keep up with connected customers.
Posted: 08 Jun 2017 | Published: 31 Dec 2016

SAS

Universal Storage for Data Lakes: An ESG Evaluation
sponsored by Dell EMC and Intel®
WHITE PAPER: This ESG paper challenges the de facto standard of direct-attached storage, and in it you will discover how scale-out NAS mitigates the challenges associated with data lake storage. Read on to see outlined the storage selection criteria for data lakes, which includes in-place analytics, accessibility by multiple app types, and more.
Posted: 06 Jun 2017 | Published: 30 Nov 2017

Dell EMC and Intel®

The Impact of IoT in the Manufacturing Sector
sponsored by Aruba Networks
VIDEO: Watch this brief video to learn how to connect IoT data from sensors on disparate devices to a single, common platform that allows manufacturers to bolster security, integrate siloed data and workflows, collaboratively share insights across teams, and more.
Posted: 06 Jun 2017 | Premiered: 27 Feb 2017

Aruba Networks

How IoT-Powered Smart Offices Boost Efficiency and Innovation
sponsored by Aruba Networks
VIDEO: Sound IoT strategies promise better productivity and innovation, and bad ones threaten security breaches and wasted investments. Learn how to improve your IoT/big data strategy and apply to data integration, data security, collaboration, and more.
Posted: 05 Jun 2017 | Premiered: 27 Feb 2017

Aruba Networks

Protecting Sensitive Corporate Data Against the Full Spectrum of Mobile Risk
sponsored by Lookout
WEBCAST: Download this webcast to discover a full EMM platform that will protect sensitive corporate data against the full spectrum of mobile risks, from software vulnerabilities to behavior and configuration threats.
Posted: 26 Jun 2017 | Premiered: Jun 6, 2017

Lookout

Fast Track Containers to Production
sponsored by Diamanti
WHITE PAPER: Discover how to fast track containers to production, increase your scalability, address containerized app requirements with converged infrastructure, enable automatic persistent storage for containers, and more.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Diamanti

Object Storage Architecture: Mitigating Complexity, Capacity, and Archival Concerns
sponsored by HGST
EGUIDE: This expert resource serves as your full guide to object storage implementation, with cloud workload, sync-and-share, API-accessible storage, and more use cases examined. Download now to gain full access, learning how object storage maintains the unstructured data deluge, and view an object vs. file vs. block storage bake off.
Posted: 21 Jun 2017 | Published: 12 Jun 2017

HGST

What GDPR Means for Your Security Strategy
sponsored by Dell SecureWorks
WHITE PAPER: Due to the GDPR, compliance is mandatory by 25th May 2018. Access this whitepaper to discover what data security requirements are laid down by the GDPR, and how to ensure your organization is ready.
Posted: 20 Jun 2017 | Published: 20 Jun 2017

Dell SecureWorks
26 - 50 of 2379 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement