IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
51 - 75 of 2283 Matches Previous Page  |  Next Page
5 Ways Your Vendor Risk Management Program Leaves You in the Dark
sponsored by BitSight
WHITE PAPER: In this white paper, you will learn the steps it takes to protect your data and implement a solid vender risk management (VRM) program.
Posted: 29 Jan 2016 | Published: 02 Dec 2015

BitSight

Big Data Management: One Fast Query on All Your Data
sponsored by Oracle Corporation
VIDEO: Access this video to learn about a big data management strategy that can work seamlessly with Hadoop and NoSQL. Discover a way to gain access to a much bigger pool of data and maintain security, all for a lower TCO than building your own cluster.
Posted: 29 Jan 2016 | Premiered: 19 Nov 2014

Oracle Corporation

Gartner Competitive Landscape: Endpoint Detection & Response (EDR)
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will examine critical EDR customer buying behaviors, solution use cases and technologies that product managers and marketing professionals must consider.
Posted: 29 Jan 2016 | Published: 26 Nov 2014

Digital Guardian

Gartner Competitive Landscape: Data Loss Prevention Market 2015
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will learn the main drivers of DLP adoption and the future of the DLP industry as a whole.
Posted: 29 Jan 2016 | Published: 22 Oct 2015

Digital Guardian

Information Governance Audit: 5 Steps You Should Take
sponsored by Veritas
RESOURCE CENTER: Access this article to learn how to better perform security audits and keep your IT environment safe and secure.
Posted: 29 Jan 2016 | Published: 30 Dec 2015

Veritas

Using Information Governance to Mitigate Risk
sponsored by Veritas
RESOURCE CENTER: In this article, discover how you can enact policies and take initiatives centered on identifying, avoiding, eliminating and ameliorating the impact of risk on your organization.
Posted: 29 Jan 2016 | Published: 23 Dec 2015

Veritas

Data Lake Architecture Concerns: Cost, Durability, and Security
sponsored by Cambridge Semantics
EGUIDE: This e-guide uncovers expert insight on data lakes and how data virtualization and federation can help enterprises maintain data durability and security. Learn how these tools can help your enterprise better manage and analyze information in your data lake.
Posted: 29 Jan 2016 | Published: 30 Apr 2015

Cambridge Semantics

5 Steps to Achieve Risk-based Application Security Management
sponsored by IBM
WHITE PAPER: This white paper will show you how to make applications security a strategically managed process.
Posted: 29 Jan 2016 | Published: 31 Jul 2015

IBM

The State of Mobile Application Security (4th Edition)
sponsored by IBM
WHITE PAPER: This white paper will give you the latest statistics of online piracy and show you what you can do to protect your IP.
Posted: 29 Jan 2016 | Published: 10 Dec 2015

IBM

Context-Aware, Dynamic Access Control
sponsored by Cryptzone
RESOURCE: This brief resource outlines how security pros need to take a dynamic approach to secure network access. Read on to learn about a new platform that considers both context and identity to grant access to your network, and see if it's right for your business.
Posted: 28 Jan 2016 | Published: 28 Jan 2016

Cryptzone

The CISO Role and the Ups and Downs of Cloud Compliance
sponsored by CloudPassage
EGUIDE: In this exclusive e-guide, you will learn about the shifting roles of the chief information security officer (CISO), as well as how to extend cyber and cloud security concerns beyond your IT department to permeate all layers of leadership. Access this guide in addition to see experts highlight the ups and downs of cloud compliance.
Posted: 28 Jan 2016 | Published: 31 Dec 2015

CloudPassage

What Story Does Your IT Security Tell?
sponsored by Prelert
DATA SHEET: In this resource, you will discover how to analyze log data and locate anomalies in order to combat advanced cyberthreats with an anomaly detection application. Access this resource to apply behavioral analytics to any data resource—including Windows event logs, DNS logs, and firewall logs.
Posted: 28 Jan 2016 | Published: 31 Dec 2015

Prelert

Aftermath of a Data Breach
sponsored by Cryptzone
RESOURCE: This resource outlines what to do in the event of a data breach, as well as important steps to take in order to reduce your risk. Read on to learn about important stats regarding data breaches and seven ways to protect against attacks.
Posted: 27 Jan 2016 | Published: 27 Jan 2016

Cryptzone

The ISO 27001 Information Security Framework
sponsored by Coalfire
WEBCAST: This webcast introduces the ISO 27001 standard and how businesses can benefit from its framework to manage security.
Posted: 27 Jan 2016 | Premiered: Oct 27, 2015

Coalfire

Powerful Data Protection, Anywhere
sponsored by Vera
WHITE PAPER: In this white paper, discover how you can secure all of your devices and applications. Find out how you can effortlessly collaborate with anyone from anywhere.
Posted: 27 Jan 2016 | Published: 02 Dec 2015

Vera

The Expectation of SSL Everywhere
sponsored by F5 Networks
WHITE PAPER: In this white paper, you will learn about the importance of SSL in securing personal data as it's grown since the Internet's inception and how it's brought cryptography to the common man.
Posted: 27 Jan 2016 | Published: 02 Dec 2015

F5 Networks

Full Database Protection Without the Full Backup Plan
sponsored by Oracle Corporation
WHITE PAPER: This white paper explores a recovery appliance that ensures data protection in real-time, at scale, for thousands of databases. Read now to see how this approach can eliminate the need for traditional batch window backups and provide your enterprise with immediate backup copies to recover from failures, corruption, and other potential disasters.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

Oracle Corporation

Improving Converged BC and DR Through Data Loss Prevention Best Practices
sponsored by Oracle Corporation
EGUIDE: Access this expert e-guide to gain best practices for data loss prevention so that your enterprise can thwart potential threats from disrupting your business continuity and disaster recovery (DR) operations. As a bonus, you will also learn how server virtualization has allowed data backups and DR to converge.
Posted: 26 Jan 2016 | Published: 26 Jan 2016

Oracle Corporation

Gartner: Data Loss Prevention Magic Quadrant for Content-Aware Data Loss Prevention
sponsored by Digital Guardian
WHITE PAPER: Continue reading this white paper to see how content-aware DLP solutions incorporate sophisticated detection techniques to help businesses address their more critical data protection requirements.
Posted: 26 Jan 2016 | Published: 12 Dec 2013

Digital Guardian

The Realities of FedRAMP Continuous Monitoring and Penetration Testing Requirements
sponsored by Coalfire
WEBCAST: This webcast explores the requirements that CSPs must meet on monthly, quarterly and an annual basis. Find answers to common FedRAMP questions, solutions for complexities that continuous monitoring can present and lessons learned from the continuous monitoring portion of FedRAMP.
Posted: 26 Jan 2016 | Premiered: Sep 16, 2015

Coalfire

FedRAMP for SaaS
sponsored by Coalfire
WEBCAST: Watch this webcast to discover how FedRAMP can increase your confidence in the security of your cloud solutions.
Posted: 26 Jan 2016 | Premiered: Mar 18, 2015

Coalfire

How to Identify the Most Significant EMM Vendors to Date
sponsored by IBM
RESOURCE: In this report designed for I&O professionals, you will discover the 11 most significant EMM providers in the industry, and evaluate their offerings based on product capabilities, vendor strategy, and market reach. Access this exclusive report to differentiate vendors based on their data, app, and unified device management policies.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

IBM

Secure Any Data, Anywhere
sponsored by Vera
WHITE PAPER: In this white paper, you will learn how to effectively protect any kind of data. Find out how you can track, audit and manage the policies in real-time and secure your data no matter what device, person, cloud or application it travels to.
Posted: 25 Jan 2016 | Published: 01 Dec 2015

Vera

IDC: Securing Data in a Borderless Enterprise
sponsored by Vera
WHITE PAPER: Access this white paper and learn how you can set security and sharing policies for your data wherever it goes, set and change data-access rights in real time, control what people can and can't do with data, and more.
Posted: 25 Jan 2016 | Published: 08 Jul 2015

Vera

Customer Success Story: Unisys Video Case Study
sponsored by SecureAuth
VIDEO: This case study details how one company was able to make their ID and access management simpler for on-premise as well as remote users. Tune in to learn how you can make password changes easier for your users, and protect sensitive data from an easy to use, mobile friendly program.
Posted: 25 Jan 2016 | Premiered: 25 Jan 2016

SecureAuth
51 - 75 of 2283 Matches Previous Page    1 2 3 4 5 6    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement