IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
51 - 75 of 2525 Matches Previous Page  |  Next Page
Protecting Data After the Digital Disruption
sponsored by Proofpoint, Inc.
WEBCAST: Data is no longer stored in one location and companies are running into challenges related to securing sensitive data. Watch this webcast to uncover key challenges driving DLP as well as stages of DLP maturity, considerations for your DLP strategy, and more.
Posted: 04 Oct 2017 | Premiered: Oct 4, 2017

Proofpoint, Inc.

Empowering IT with Distributed Capture Scanner Technology
sponsored by Kodak Alaris
WHITE PAPER: Take the next step on your digital transformation journey and discover how distributed capture technology can help IT departments ensure a fast, secure flow of data through the enterprise, improve user experiences, manage unstructured data volumes, and accelerate document management.
Posted: 04 Oct 2017 | Published: 31 Aug 2016

Kodak Alaris

Best Practices of Third-Party Software Security
sponsored by Veracode, Inc.
WHITE PAPER: This white paper offers best practices for improving software security across your entire application landscape. Uncover best practices and approaches for securing third-party applications, open source components, and outsourced code.
Posted: 04 Oct 2017 | Published: 04 Oct 2017

Veracode, Inc.

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: In a recent Verizon study, there were 2,260 confirmed data breaches in 82 countries with 40% resulting directly from web app attacks. Gain a deeper understanding about app security and uncover 3 steps to reach AppSec maturity.
Posted: 04 Oct 2017 | Published: 04 Oct 2017

Veracode, Inc.

From the Top: What Executives Need to Know About Cybersecurity
sponsored by Kaspersky Lab
WHITE PAPER: $117,000 is the average financial impact of a data breach for SMBs in North America and $1.3 million is the average impact for a large enterprise in North America. This paper identifies 6 myths about enterprise security to help you strengthen your approach, so you do not fall victim to data breach's large financial impact.
Posted: 04 Oct 2017 | Published: 04 Oct 2017

Kaspersky Lab

Top 3 Ways HyperScale for OpenStack Protects your Applications and Data
sponsored by Veritas
WHITE PAPER: Ensuring adequate data protection is critical before placing workloads (and the corresponding data that they operate upon) into production. This tip sheet outlines the 3 ways in which Veritas HyperScale for OpenStack keeps your applications and data safe.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Veritas

Governance and Compliance in 2017: A Real World View
sponsored by Box
RESEARCH CONTENT: Read AIIM's report to learn about today's information governance challenges and steps your organization can take to tackle them.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Box

Leveraging a Revolutionary Software-Defined Storage Architecture for OpenStack-Based Clouds
sponsored by Veritas
WHITE PAPER: Enterprises are adopting private clouds to meet business demands, address competitive pressures and realize benefits such as cost-effectiveness and agility. Veritas HyperScale for OpenStack employs a new architecture that uses direct attached storage and divides the storage functionality across two separate planes. Read on to learn more.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Veritas

IT Security: Cost Center or Strategic Investment?
sponsored by Kaspersky Lab
WHITE PAPER: Understanding the math behind the cost of a cyberattack is more crucial now than ever. By reading this white paper, gain a deeper understanding of the cost of IT security incidents and how to move your organization forward in preventing data breaches.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Kaspersky Lab

The Human Factor in IT Security: How Employees Are Making Businesses Vulnerable from Within
sponsored by Kaspersky Lab
WHITE PAPER: 52% of businesses admit that employees are their biggest weakness in IT security, with their careless actions putting data and networks at risk. In this white paper gain insight into how to address the "human factor" dilemma and eliminate employee irresponsibility by following the right steps forward.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Kaspersky Lab

Steps to Protect Your Growing Data
sponsored by SearchSecurity.com
EZINE: The distribution of data and the many ways in which it can be accessed has made handling data protection risks especially challenging. In this issue of Information Security, security experts examine data protection risks and considerations for implementing a data - centric security model.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

SearchSecurity.com

Enterprise Mobility Trends to Watch in 2017: Q&A with Sumit Dhawan
sponsored by VMware
WHITE PAPER: Download this Q&A to find out how companies can turn problematic realities such as shadow IT and BYO trends, into real business value.  And, discover additional insights into key enterprise mobility trends to watch—and how to take action.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

VMware

Lightning Speed: Getting to the Cloud Faster
sponsored by Commvault
WHITE PAPER: You need to get your organization into the cloud before your employees start doing it on their own, creating a shadow IT nightmare. Access this white paper to learn how to get to the cloud faster than your employees can put your organization at risk.
Posted: 02 Oct 2017 | Published: 31 Dec 2015

Commvault

Cloud Data Management: Enabling Hybrid IT Infrastructure
sponsored by Commvault
VIDEO: Moving to the cloud has its advantages, but you cannot rush the process when it comes to securely moving and managing your data. Take 1 minute to learn how intelligent hybrid IT can move your data efficiently, securely, and enable access to data when you need it.
Posted: 02 Oct 2017 | Premiered: 26 May 2017

Commvault

11 Things Every Organization Needs to Know When Migrating Oracle Apps to the Cloud
sponsored by Cintra
WHITE PAPER: While Oracle's cloud is engineered to work with your Oracle apps and databases, it isn't simply a case of shifting exactly what you've got on-premise to the cloud. Discover 11 things you need to consider as you plan your Oracle cloud migration.
Posted: 02 Oct 2017 | Published: 31 Dec 2016

Cintra

Gemalto Wades Deeper into IDaaS Waters with Adaptive Access Controls for Cloud Resources
sponsored by Gemalto
WHITE PAPER: Authentication and access controls typically present a tradeoff between security and convenience. This white paper keys into how Gemalto SafeNet offers 3 core functions each time a user attempts to access on-premises or cloud resources.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Gemalto

6 Things That Will Accelerate Enterprise Mobility Security Adoption
sponsored by SyncDog
WHITE PAPER: According to a recent Gartner press release, 75% of mobile applications do not include basic security testing. Are you equipped to handle a massive cybersecurity breach from mobile device vulnerability? Security experts believe the marketplace isn't prepared.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

SyncDog

Firewall Best Practices to Block Ransomware
sponsored by Sophos, Inc.
WHITE PAPER: Recent ransomware attacks like Wannacry and Petya have spread largely unchecked through corporate networks in recent months, extorting money to restore your data and regain control of your computers. This white paper reveals best practices for configuring your firewall and network to protect against ransomware.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Sophos, Inc.

Synchronized Security: Best-of-breed defense that's more coordinated than attacks
sponsored by Sophos, Inc.
WHITE PAPER: Today's attacks are more sophisticated and coordinated than ever. According to ESG Group, 46% of organizations believe they have a problematic shortage of cybersecurity skills. Inside, learn how to protect against known and emerging threats.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Sophos, Inc.

GDPR will bring the Teeth that have been Missing in Data Security Auditing and Compliance
sponsored by SyncDog
WHITE PAPER: Data security standards have been around for decades yet standards enforcement has been lacking. This paper identifies 5 steps to help maintain compliance leading up to GDPR.
Posted: 28 Sep 2017 | Published: 28 Sep 2017

SyncDog

SyncDog Metropolitan Police Department Case Study
sponsored by SyncDog
WHITE PAPER: In this case study, find out how a large metro police department faced dramatic improvements of workflow and compliance for handling of crime-scene data.
Posted: 28 Sep 2017 | Published: 28 Sep 2017

SyncDog

Slow & Steady Will Not Win The Cybersecurity Race
sponsored by CloudPassage
WHITE PAPER: Only 50% of respondents believe that security is capable of moving as fast as new release cycles, according to professionals interviewed at the RSA USA conference. Take a closer look at this infographic to uncover statistics about what IT professionals think about security technologies today.
Posted: 28 Sep 2017 | Published: 28 Sep 2017

CloudPassage

Don't Let Legacy Security Tools Hold Up PCI Compliance in the Cloud
sponsored by CloudPassage
WHITE PAPER: Explore the top challenges of using traditional PCI security controls in a cloud environment. Learn how you can automate cloud compliance with the Payment Card Industry Data Security Standard.
Posted: 27 Sep 2017 | Published: 27 Sep 2017

CloudPassage

A New Approach for Securing DevOps Environments in the Cloud
sponsored by CloudPassage
WHITE PAPER: Don't let the rapid pace of today's technology environment hinder your security posture. Explore this white paper and reveal how to keep up with ever changing technologies and secure your DevOps environments in the cloud.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

CloudPassage

A Primer on File-Borne Malware Threats
sponsored by OPSWAT inc
WHITE PAPER: Verizon's 2017 Data Breach Investigations Report found that 66% of malware was installed via malicious email attachments. In this white paper, examine the ways attackers use files to deliver malware, the reasons these methods are effective, and the steps organizations should take to block these kinds of attacks.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

51 - 75 of 2525 Matches Previous Page    1 2 3 4 5 6    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement