IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
51 - 75 of 2442 Matches Previous Page  |  Next Page
Backup target features expand use cases and evolve for better data protection
sponsored by Hedvig Inc
EGUIDE: Disk-based backup targets have evolved to become far more than just cheap disk arrays. It is vital to understand the different capabilities these systems can offer. In this guide discover new features such as in-place recovery - that allows a virtual machine to instantiate its data store directly from an appliance.
Posted: 15 Feb 2017 | Published: 13 Feb 2017

Hedvig Inc

Manage Application Security Risks to Help Protect your Organization’s Critical Data
sponsored by IBM
WHITE PAPER: Effective application security is really a matter of managing risk. Learn how to develop application security when you build an asset inventory, assess the business impact, and 3 more ways to mitigate risks to your most crucial assets.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

IBM

How to Keep Your Data Secure In An Increasingly Insecure World
sponsored by Micron
WHITE PAPER: Digital information has completely transformed the way we live and do business. But with this change comes the need for strong data security measures to protect vital information. In this white paper, explore important data security topics and considerations, including data breaches, regulations and standards, drive decommissioning and more.
Posted: 13 Feb 2017 | Published: 01 Nov 2015

Micron

Tackling Insider Threats
sponsored by Intel Security
WHITE PAPER: Security is an inside job. Insiders are responsible for more than 40% of data loss. Whether it's intentional or accidental, you need to stop it with policy development, event monitoring, and incident response—backed by a strong set of data loss prevention tools. Learn more. Read Tackling Insider Threats.
Posted: 13 Feb 2017 | Published: 30 Nov 2016

Intel Security

Building Trust in a Cloudy Sky
sponsored by Intel Security
RESEARCH CONTENT: 90% of companies now use cloud services, not all of it sanctioned by IT. Moreover, more sensitive data is being stored in the cloud outside the visibility and control of IT. Learn more "Building Trust in a Cloudy Sky."
Posted: 10 Feb 2017 | Published: 31 Jan 2017

Intel Security

How to Prepare for Out-of-Control Data Growth
sponsored by Micron
WHITE PAPER: If you're ready for a storage refresh, access this infographic to prepare for the big data deluge by adopting flash to extend scalability, enhance virtualization support, simplify storage capacity management, and more. You'll also clue into the main drivers behind software-defined storage adoption, as told by IT pros.
Posted: 09 Feb 2017 | Published: 09 Feb 2017

Micron

How to Plan Your Hybrid Cloud Backup Strategy
sponsored by Colospace Inc.
EGUIDE: Considering using hybrid cloud to backup your business? It can get complicated very quickly if you're not sure what you're doing. This e-guide walks you through everything you need to know to establish, or strengthen, your cloud backup strategy.
Posted: 08 Feb 2017 | Published: 06 Feb 2017

Colospace Inc.

Top 10 Reasons Quorum Beats the Competition
sponsored by QuorumLabs Inc.
PRODUCT REVIEW: Discover how Quorum's backup and disaster recovery solution can benefit your enterprise and how they compare to the competition.
Posted: 08 Feb 2017 | Published: 08 Feb 2017

QuorumLabs Inc.

Lowering Business Risk with Data
sponsored by Cloudera
WHITE PAPER: Companies must stay one step ahead of looming risks. Learn how you can reduce your overall risk exposure by more effectively leveraging your data.
Posted: 07 Feb 2017 | Published: 07 Feb 2017

Cloudera

Ensure A Safe, Successful Move To The Cloud With A Good Information Governance Plan
sponsored by IBM
WHITE PAPER: The benefits of moving data to the cloud are numerous, but doing so without an information governance plan in place can cause more problems than it solves. In this white paper, learn how you can create an effective information governance methodology and increase your success of migrating safely to the cloud.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

IBM

Accelerating Your BDR: 7 Ways to Turn Your Turtle into a Cheetah
sponsored by QuorumLabs Inc.
WHITE PAPER: Discover 7 ways you can accelerate your backup and disaster recovery and stay ahead of your competitors.
Posted: 02 Feb 2017 | Published: 02 Feb 2017

QuorumLabs Inc.

How to Plan For The General Data Protection Regulation & Govern Your Data
sponsored by IBM
WHITE PAPER: Customer information can offer invaluable insights into trends, behavior and spending habits. However, using and storing personal information can also be a big risk to organizations if not handled properly. In this white paper, learn about the General Data Protection Regulation (GDPR), including how to protect and govern your organization's data.
Posted: 02 Feb 2017 | Published: 01 Nov 2016

IBM

Are we trusting social networks too much?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
Posted: 31 Jan 2017 | Published: 31 Jan 2017

ComputerWeekly.com

Securing the Most Important Apps and Data—Yours
sponsored by Citrix
RESOURCE: Discover a digital workspace that promotes exceptional user experience by delivering apps, data, and complete desktops available on any device, over any network. Read on to empower seamless, secure, and productive work that flexes for your workloads (whether on-premises, cloud, or hybrid).
Posted: 26 Jan 2017 | Published: 26 Jan 2017

Citrix

Are you one eDiscovery away from a budgetary meltdown?
sponsored by ComputerWeekly.com
ANALYST REPORT: Using an online object storage platform with global namespaces can provide full data protection, high availability and easily managed eDiscovery in a way that fully supports the business, say analysts Clive Longbottom and Marcus Austin.
Posted: 25 Jan 2017 | Published: 25 Jan 2017

ComputerWeekly.com

Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware
sponsored by BlackBerry
WHITE PAPER: With destructive malware ravaging the networks of governments, Aramco, Sands Corporation, and Sony Pictures, you need to adjust your tactics to ensure your continued safety. In this white paper, discover a deeper look at these recent attacks and potential countermeasures to thwart them.
Posted: 23 Jan 2017 | Published: 17 Oct 2016

BlackBerry

Prevention Is Not Always Foolproof: Enter Unified Cloud Backup and Recovery
sponsored by QuorumLabs Inc.
RESOURCE: Download this resource to take a brief but informative look at how unified data backup/DR provides you with the ability to execute instant recovery, offsite replication, archiving, advanced deduplication, and more. Learn how to configure your DR in minutes with a robust DRaaS cloud.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

QuorumLabs Inc.

The 5 Rings of Data Integration Hell Impacting Your Security
sponsored by Globalscape
WHITE PAPER: In this guide discover the 5 "rings of hell" that make meeting data integration requirements difficult and threaten the security of your data. Learn about the various scenarios which can cause data integration challenges, methods for data migration worth considering, and more.
Posted: 11 Jan 2017 | Published: 31 Dec 2016

Globalscape

How The US Navy Helped Transform Today's BDR Market
sponsored by QuorumLabs Inc.
WHITE PAPER: This white paper explains how the US Navy helped transform today's BDR market. Discover an agnostic solution that fits into any environment to provide backup and disaster recovery capabilities that now offers the fastest recovery in the market, as well as the easiest backups.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

QuorumLabs Inc.

Protecting your organisation from itself
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.
Posted: 06 Jan 2017 | Published: 06 Jan 2017

ComputerWeekly.com

Security for the Future-Ready Workforce
sponsored by Dell India
WHITE PAPER: To both empower the workforce and protect the enterprise, organizations must choose the right technologies and match users to the right devices. Learn how to cover the needs of 5 future-ready worker categories, while keeping your data safe.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

Dell India

Survey Findings: Data Security
sponsored by Dell India
WHITE PAPER: This data security report illuminates the data security concerns held by businesses. Learn how to obtain the business support needed to integrate data security, while mitigating the cloud and mobile risks that plague IT.
Posted: 04 Jan 2017 | Published: 04 Jan 2017

Dell India

Cloud Security and Content Management: Box Case Study
sponsored by IBM
WHITE PAPER: Learn how to secure Box on the cloud, and in doing so yield more benefits than just keeping your data safe.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

IBM

Box: Securing Business Information in the Cloud
sponsored by IBM
WHITE PAPER: Learn how to address content security challenges with Box on the cloud and enable productivity and collaboration with anyone, anywhere, and at any time, while maintaining control and compliance over your business content.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

IBM

ECM and Collaboration: Transforming Work in the Cloud
sponsored by IBM
WEBCAST: This webcast explores how to enable sound content management, even in an era of growing reliance on cloud and mobile computing. Discover how to implement a content strategy that unlocks benefits like simplified end-user experiences, accelerated collaboration, cloud-capable ECM, secure file sync and share across all devices, and more.
Posted: 03 Feb 2017 | Premiered: Feb 3, 2017

IBM
51 - 75 of 2442 Matches Previous Page    1 2 3 4 5 6    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement