IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
51 - 75 of 2379 Matches Previous Page  |  Next Page
Cloud Data Management Tailor-Made For Your Business
sponsored by Veritas
RESOURCE: 74% of organizations have a multi-cloud strategy and 71% operate in a hybrid cloud model. As this trend continues to grow, data visibility, protection, and simplified cloud migration are all taking center stage. Access this infographic to learn about these 3 cloud data management focus areas and how to factor them into your cloud strategy.
Posted: 14 Apr 2017 | Published: 30 Dec 2016

Veritas

Ransomware Detection and Prevention Tools You Need Now
sponsored by SearchSecurity.com
EBOOK: Fighting today's malware threats requires a range of ransomware prevention tools. Learn how to tweak the tools you have and identify what new tools you need.
Posted: 13 Apr 2017 | Published: 05 Mar 2017

SearchSecurity.com

Building Trust in a Cloudy Sky Executive Summary
sponsored by McAfee, Inc.
WHITE PAPER: Over 90% of organizations worldwide are leveraging cloud services and – faced with a growing skills gap and increasingly advanced threats – can cybersecurity strategies keep up with the demands of the cloud? Uncover the findings of a survey of over 2,000 IT pros to learn about protecting sensitive data and apps in the cloud.
Posted: 11 Apr 2017 | Published: 31 Jan 2017

McAfee, Inc.

Array Networks Secure Remote Access Case Study: City of Santa Barbara
sponsored by Array Networks
CASE STUDY: The City of Santa Barbara needed a way to provide anytime, anywhere access to documents, files and email from any device, while maintaining the security of confidential information, regardless of the device used to access it. Download this case study to find out how the City of Santa Barbara solved these challenges.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

Array Networks

Fourth Generation Data Leak Prevention
sponsored by Ghangor Cloud
WHITE PAPER: In this white paper, learn what you need to know about the 4th generation of data leak prevention solutions.
Posted: 05 Apr 2017 | Published: 31 Jan 2017

Ghangor Cloud

Don't Settle, Choose the Best Mobile Security Platform for Your Mobile Transformation
sponsored by MobileIron
WHITE PAPER: This white paper explores how to leverage a modern, scalable EMM platform to bolster your mobile security strategy. Access a comparison guide between AirWatch and MobileIron and learn how to enhance your strategy for securing all things mobile, from apps to emails and beyond.
Posted: 05 Apr 2017 | Published: 31 Dec 2016

MobileIron

Jargon buster guide to GDPR
sponsored by ComputerWeekly.com
EGUIDE: In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.
Posted: 31 Mar 2017 | Published: 31 Mar 2017

ComputerWeekly.com

Data Governance: Embracing Security and Privacy
sponsored by Tealium
WHITE PAPER: With proper analysis and planning, you can minimize risk, build trust, and protect your brand. This white paper discusses steps to take for building an effective data governance strategy.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Tealium

The Definitive Guide to Data Protection and Disaster Recovery on Enterprise Clouds
sponsored by Nutanix
EBOOK: Access this e-book to examine important challenges and trends in availability and data protection. You will learn about a simple, cost-effective approach that works with enterprise cloud computing that helps you not only catch up, but future-proof your data protection.
Posted: 21 Mar 2017 | Published: 30 Jun 2016

Nutanix

The Definitive Guide to Hyperconverged Infrastructure
sponsored by Nutanix
EBOOK: Hyperconverged infrastructure has emerged to become the building block of your enterprise cloud. Access this comprehensive guide to learn everything you need to know to get started in your search for a hyperconverged infrastructure platform.
Posted: 20 Mar 2017 | Published: 20 Mar 2017

Nutanix

5 Steps To Defining Your Data Retention Policies
sponsored by Iron Mountain
WHITE PAPER: Not having a strong data retention plan could end up not only costing you storage space, but could also harm your bottom line. Use this blog post to help you outline your data retention policies in five simple steps.
Posted: 17 Mar 2017 | Published: 13 Jan 2016

Iron Mountain

Cyber-physical attacks: Dawn of a new age in cyber-warfare?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series explores the application of cyber power in international relations
Posted: 14 Mar 2017 | Published: 14 Mar 2017

ComputerWeekly.com

Infographic: A New Dawn for Data Privacy
sponsored by Symantec & Blue Coat Systems
RESOURCE: EU General Data Protection Regulation (GDPR) will be implemented in 2018, introducing a new era in data security. In this infographic, learn what you need to know about GDPR and how it will affect your enterprise.
Posted: 08 Mar 2017 | Published: 30 Dec 2016

Symantec & Blue Coat Systems

Digital Innovations and Changing Demographics are Redefining Government by the People, for the People
sponsored by HPE and Intel®
WHITE PAPER: Access this paper to learn about communicating with the different generations of people and how you'll have to handle your data. Learn how to find the right mix of traditional IT, cloud, security and mobility to provide the greatest service possible.
Posted: 07 Mar 2017 | Published: 30 Dec 2016

HPE and Intel®

CW Europe – March 2017
sponsored by ComputerWeekly.com
EZINE: Technology advancements in recent years have brought about huge social challenges. Artificial intelligence and big data, for example, have gained the serious attention of policy makers across the world.
Posted: 06 Mar 2017 | Published: 09 Mar 2017

ComputerWeekly.com

Artificial Intelligence and Machine Learning: Cybersecurity Advances
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at machine learning in security and how recent advances may bolster your defenses.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

SearchSecurity.com

Five Windows 10 security risks that are easy to overlook
sponsored by vmware airwatch
EGUIDE: As more organizations upgrade from Windows 7, the time is right to think about how to create the perfect Windows 10 security setup. But before upgrading to Windows 10, understand these 5 security risks that are easy to overlook.
Posted: 27 Mar 2017 | Published: 17 Mar 2017

vmware airwatch

The Essential Guide to Storage for DevOps
sponsored by Tintri
WEBCAST: When it comes to DevOps, you might be overlooking the significance of cloud storage. Access this e-book to learn about the significant impact the right--or wrong--cloud storage in place will have on your DevOps' development.
Posted: 27 Mar 2017 | Premiered: Dec 30, 2016

Tintri

The Essential Guide Data Protection and Disaster Recovery
sponsored by Tintri
WHITE PAPER: Download this guide to understand the must-have storage features that are essential to modern DP and DR practices;provided are specific guidelines on what to look for, how to strategize DR in your organization, and more.
Posted: 24 Mar 2017 | Published: 24 Mar 2017

Tintri

EMM Real Benefits in Today's Mobile World
sponsored by vmware airwatch
WHITE PAPER: The economy isn't standing still. For your business to succeed, your employees shouldn't either. This eBook relays the importance of unifying your infrastructure to deliver apps effectively across multiple devices. Learn how to stay on top of security and consistency with enterprise mobility management.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

vmware airwatch

Five Key Indicators that You Need to Adopt EMM Now
sponsored by vmware airwatch
WHITE PAPER: How do you know if your organization is ready to make the move to enterprise mobility management (EMM)? Read this white paper to determine if it is the right time to adopt EMM, especially if your organization experiences: Increased need for security and compliance, device expansion or rapid growth.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

vmware airwatch

Customer Success Stories: Unified Endpoint Management
sponsored by vmware airwatch
EBOOK: End users expect to be able to work anywhere, at any time, and from any device. They expect a similar experience for accessing work apps and data across all their devices. Download now to learn why leading organizations around the world rely on VMware AirWatch unified endpoint management for their enterprise mobility solution.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

vmware airwatch

The Massive Mobile Migration
sponsored by IBM
WHITE PAPER: The move to mobile devices, data and apps to make work happen anytime, anywhere is continuing to experience massive adoption. Download this infographic to see the numbers you can't ignore this year.
Posted: 03 Mar 2017 | Published: 27 Apr 2016

IBM

UBM Dark Reading & VMware AirWatch® Webinar
sponsored by vmware airwatch
WEBCAST: In this session, we'll cover how VMware Workspace™ ONE™ can help drastically simplify the deployment of Office 365 and provide the security controls to protect your sensitive information that is stored in corporate email, OneDrive, and SharePoint.
Posted: 03 Mar 2017 | Premiered: Mar 3, 2017

vmware airwatch

The Current State of Blockchain Compliance
sponsored by BAE Systems Applied Intelligence
EGUIDE: In this expert e-guide, we examine blockchains and how they're affecting digital enterprise assets and cybersecurity. Discover how these distributed ledgers relate to Bitcoin and data security. Plus, learn how blockchain innovation and apps like smart contracts are affecting compliance.
Posted: 01 Mar 2017 | Published: 24 Feb 2017

51 - 75 of 2379 Matches Previous Page    1 2 3 4 5 6    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement