IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
51 - 75 of 2405 Matches Previous Page  |  Next Page
Middleware and Operating System Machine Data
sponsored by Splunk
WHITE PAPER: This white paper explores how to enhance your big data strategies so that you can derive actionable intelligence from your organization's machine data. Find out how to optimize the value you get from the machine data created by middleware and OS and support data security, analytics, and more.
Posted: 23 May 2017 | Published: 23 May 2017

Splunk

The Essential Guide to Machine Data
sponsored by Splunk
VIDEO: This brief webcast explores the concept of machine data and how it works. Find out how to unify access to and correlate data between IT, app development, and security to monitor and prevent critical data breaches.
Posted: 23 May 2017 | Premiered: 06 Mar 2017

Splunk

GDPR: Understanding Your Data
sponsored by Informatica
WEBCAST: As you prepare to comply with the General Data Protection Regulation (GDPR), you must have a full understanding of the challenges you'll face in order to overcome them smoothly. Join Patrick Dewald and Guiseppe Mura of Informatica to learn how to prepare your company for the GDPR.
Posted: 23 May 2017 | Premiered: May 22, 2017

Informatica

Windows 10: The Unavoidable Upgrade
sponsored by Citrix
RESOURCE: Eliminate the challenges and complexity of a Windows 10 migration with a virtual desktop solution. Businesses need to formulate a strategy to maintain productivity and support their employees regardless of the user's chosen endpoint device or operating system. Learn how.
Posted: 19 May 2017 | Published: 19 May 2017

Citrix

The Security Compliance Countdown
sponsored by Citrix
RESOURCE: Businesses everywhere are bracing for the GDPR takeover. See what issues are causing IT anxiety and learn what you can do to get ahead.
Posted: 19 May 2017 | Published: 19 May 2017

Citrix

The Internet of Relevant Things
sponsored by Aruba Networks
WHITE PAPER: The Internet of Things (IoT) term itself can be misleading, so it is important to consider one thing before going into a project: relevancy. Access this white paper to learn how to evaluate your IoT projects for business relevancy and better manage projects with secure networking without compromising usability.
Posted: 17 May 2017 | Published: 18 Jan 2017

Aruba Networks

IoT: How Real-Time Data and Analytics Enable Operational Intelligence
sponsored by Teradata
RESEARCH CONTENT: This white paper explores how to update your data management and analytics strategies for the increased volumes, security risks, and complexities of IoT. Learn how to improve your organization's decision-making and start planning for you future in IoT with 10 best practice recommendations.
Posted: 17 May 2017 | Published: 17 May 2017

Teradata

5-Step Data Quality Framework For Data In Motion
sponsored by Infogix
WHITE PAPER: 6 out of 10 users don't trust their data – and this is all the more strengthened when data is flowing through a myriad of systems prior to analysis. The truth is, if your data is in motion, you may have data quality issues. Learn a 5-step data quality framework for data in motion.
Posted: 15 May 2017 | Published: 15 May 2017

Infogix

4 Mobile Security Insights for CISOs
sponsored by Lookout
WHITE PAPER: Discover the four mobile security insights that you must know, about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Posted: 12 May 2017 | Published: 12 May 2017

Lookout

Manage, Monitor & Secure Your IoT Deployment
sponsored by VMware
WEBCAST: The Internet of Things (IoT) is the cause of the next industrial revolution. To take advantage, your IT and OT teams need total control over their IoT use cases. Take 2 minutes to watch this webcast and learn how to manage, monitor, and secure the entirety of your IoT on-premise or in the cloud.
Posted: 12 May 2017 | Premiered: May 5, 2017

VMware

The EU General Data Protection Regulation (GDPR): A Pocket Guide
sponsored by DataStax
EGUIDE: Under the General Data Protection Regulation (GDPR), businesses that fail to comply and suffer a data breach could face huge fines. In this comprehensive pocket guide, learn what you need to know to comply with the GDPR, including a history of data protection, the rules of the Regulation itself, how to appropriately comply, and more.
Posted: 12 May 2017 | Published: 12 May 2017

DataStax

Tips for Finding a Compliant DaaS Platform and 3 Security Features to Look for in a Provider
sponsored by Nerdio
EGUIDE: Finding a compliant DaaS platform isn't always easy. Every organization has their own unique requirements when it comes to compliance and security needs. Use this e-guide to discover tips for finding a platform that meets your organization's needs, and discover 3 security features to look for in a provider.
Posted: 11 May 2017 | Published: 05 May 2017

Nerdio

Bracing for Digital Disruption: What the CIO Needs to Know
sponsored by Infor
WHITE PAPER: This white paper is the CIO's strategy guide to bracing for digital disruption. Learn how to shepherd the launch of new implementations and step into the future with confidence.
Posted: 10 May 2017 | Published: 28 Feb 2017

Infor

Citrix ShareFile eases IT migration to Windows 10®
sponsored by Citrix
WHITE PAPER: Access this white paper to discover a technology that eases OS migrations making future updates simpler. And, find out how the technology allows user data to be freed from devices, protected from overwrites and under your control.
Posted: 09 May 2017 | Published: 09 May 2017

Citrix

Hybrid Cloud & Data Fabric For Dummies
sponsored by NetApp
WHITE PAPER: Hybrid clouds are seeing a growth in adoption rates, but we're also seeing data management challenges arise. This guide explores these challenges to the hybrid cloud model and how a data fabric addresses them.
Posted: 09 May 2017 | Published: 31 Dec 2015

NetApp

MobileIron and iOS: The Security Backbone for the Modern Enterprise
sponsored by MobileIron
WHITE PAPER: Download this white paper to discover an EMM solution that provides a comprehensive platform that protects enterprise information wherever it lives: in the datacenter, in the cloud, in mobile apps, on mobile devices, and in motion between them.
Posted: 09 May 2017 | Published: 09 May 2017

MobileIron

The Investigatory Powers Act 2016 and Internet Connections Records
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
Posted: 09 May 2017 | Published: 09 May 2017

ComputerWeekly.com

Why Organizations Still Struggle to Digitally Transform & Innovate
sponsored by TechData - Veeam
WHITE PAPER: Over 80% of enterprises deal with a data availability gap. Do you know how many millions that gap is costing you? Access this white paper to learn how to close the availability and protection gaps, quantify your availability goals, see how these challenges are impacting your digital transformation strategies, and more.
Posted: 09 May 2017 | Published: 09 May 2017


Infographic: IoT at Enterprise Scale - 6 Best Practices
sponsored by VMware
RESOURCE: The Internet of Things (IoT) is introducing new challenges to traditional operations environments. Access this infographic to prepare for an onslaught of IoT use cases and refocus your strategy to focus on scale, complexity, and security.
Posted: 08 May 2017 | Published: 08 May 2017

VMware

Computer Weekly – 9 May 2017: Casting the IT skills net wider
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.
Posted: 08 May 2017 | Published: 09 May 2017

ComputerWeekly.com

The 5 Features of an Always On Data Platform
sponsored by DataStax
WHITE PAPER: Access this white paper to learn about the 5 features of an always on data platform. Find out what it takes to achieve always on success, how to handle mixed workloads in real time, and more.
Posted: 08 May 2017 | Published: 08 May 2017

DataStax

Data Center Services: Trust the Professionals
sponsored by Comarch
WHITE PAPER: Whether you have an established data center, or are designing and building one, outsourcing to data center services can help stretch your budget and maximize your ROI. Access this white paper to learn about a data center service provider and IT infrastructure as a service to see how your data center stands to benefit.
Posted: 05 May 2017 | Published: 05 May 2017

Comarch

Do You Know Where Your Data Is? Three Common Data Management Problems & How to Fix Them
sponsored by Globalscape
WHITE PAPER: Knowing the location of your data plays a crucial role with keeping it secure. When you find yourself jumping through hoops in order to protect, monitor, or report on your data, then you're not getting the most out of your IT infrastructure. Is your current IT infrastructure helping you—or hurting you? Access this e-book to find out.
Posted: 23 May 2017 | Published: 23 May 2017

Globalscape

Your Data in the Cloud: Steps to a Seamless Migration
sponsored by Globalscape
EBOOK: 90 percent of organizations are looking at moving away from their legacy systems and into crafting a cloud strategy. Making a move to the cloud is a shift forward in many ways, and can empower organizations to accomplish much more with less. In this eBook, you'll learn about several cloud migration strategies.
Posted: 19 May 2017 | Published: 19 May 2017

Globalscape

GDPR Developments Will Dominate Storage and Compliance in 2017
sponsored by Arrow + NetApp
EGUIDE: In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.
Posted: 17 May 2017 | Published: 11 May 2017

Arrow + NetApp
51 - 75 of 2405 Matches Previous Page    1 2 3 4 5 6    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement