IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
76 - 100 of 2553 Matches Previous Page  |  Next Page
Contemplating Digital Transformation?
sponsored by Hewlett Packard Enterprise
RESOURCE: Digital transformation (DX) can be a complex process, but no innovation should be. This infographic gives you a list of questions that will help guide your DX journey.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Hewlett Packard Enterprise

Guide to Hyperconverged Infrastructure Implementation Strategies
sponsored by Hewlett Packard Enterprise
EBOOK: Access this 120+ page e-book for a comprehensive guide to hyperconverged infrastructure implementation strategies.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Hewlett Packard Enterprise

A Guide to Improving Availability and Data Protection in the Hybrid Cloud
sponsored by Veeam Software
WHITE PAPER: The hybrid cloud enables organizations to reduce costs and increase agility – however, you must ensure you are making the shift to the cloud safely, securely, and strategically. Learn how to do so in this white paper.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Veeam Software

7 Steps to Achieve Database Security in the Cloud
sponsored by Trustwave
WHITE PAPER: As organizations increasingly move databases to the cloud to take advantage of the cost savings and flexibility, it's more important than ever to factor in security. Learn 7 steps to cost effective database security in the cloud.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Trustwave

How Secure is Open Source Software?
sponsored by Flexera Software
EGUIDE: In this expert e-guide, learn about open source security requirements to consider and who should be responsible for security and support. Discover how to keep track of open source software for licensing and security purposes.
Posted: 30 Aug 2017 | Published: 24 Aug 2017

Flexera Software

Protecting Patient Data & Complying with HIPAA Security Regulations
sponsored by Trustwave
WHITE PAPER: Data protection is essential – particularly in the health industry. The Health Insurance Portability and Accountability Act (HIPAA) was enacted to protect Personal Health Information (PHI) of patients. Learn how to comply with HIPAA security regulations.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Trustwave

How To Meet The New Mandates For European Consumer Data
sponsored by Ivanti
WHITE PAPER: Take an in-depth look at this white paper to reveal how you can meet GDPR requirements and strengthen your data protection strategy.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Ivanti

How to Move Data Protection to the Cloud
sponsored by Druva Software
WHITE PAPER: Read this resource to discover 5 considerations for moving your virtual systems data protection to the cloud, including improved business agility, simplified management, and more.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Druva Software

Trust Must Be The Foundation Of Your B2B Digital Ecosystem
sponsored by IBM
WHITE PAPER: This Forrester report discusses the fundamental role trust plays in your digital transformation strategy. Learn about trust in the B2B context and analyzes the key technologies, processes, and operational values that CIOs and their teams must use to build and maintain trusted ecosystem partnerships.
Posted: 30 Aug 2017 | Published: 29 Mar 2017

IBM

6 Reasons to Choose the Dell EMC Data Protection Suite Family
sponsored by Dell EMC and Intel®
WHITE PAPER: Access this resource to discover 6 essential features every data protection suite must have. Whether on-premises or in the cloud, see how one suite centralizes monitoring, analysis, and reporting, as well as enables global management of data copies across primary and protection storage.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

Dell EMC and Intel®

Why In-cloud Data Protection Architecture Matters to a Modern IT Infrastructure
sponsored by Dell EMC and Intel®
WHITE PAPER: ESG evaluates in-cloud data protection in this white paper, which will centralize, automate, and accelerate backup and recovery in your organization. Access now to see, in this vein, an economic analysis of Dell EMC Protection Software, with the storage and compute efficiency of their data protection-optimized cloud storage appliance highlighted.
Posted: 29 Aug 2017 | Published: 30 Jun 2017

Dell EMC and Intel®

Top Areas to Look for in Data Protection Tools
sponsored by Dell EMC and Intel®
WHITE PAPER: We are entering an era where data is your most valuable asset. You need a data protection tool to ensure that your data stays yours. This white paper gives you 8 key focus areas to evaluate when making your data protection decision.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

Dell EMC and Intel®

5 Reasons to Choose Dell EMC for Data Protection
sponsored by Dell EMC and Intel®
RESOURCE: Download this resource to get an overview of Dell EMC's data protection portfolio, including five foundational features that ensure you'll meet all of your data protection requirements.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

Dell EMC and Intel®

How to Block Malicious File Uploads
sponsored by OPSWAT inc
WHITE PAPER: File uploads offer an attack vector to cybercriminals. This white paper describes the best ways to prevent malicious file uploads and the keys to protecting your sensitive data.
Posted: 29 Aug 2017 | Published: 29 Aug 2017


'Hacking with Pictures': Stegosploit and How to Stop It
sponsored by OPSWAT inc
TECHNICAL ARTICLE: Take a closer look into Stegosploit, a type of malware that is inserted into certain extra-data sections of an image. Learn how image-borne malware works, which image formats can carry Stegosploit, and how to remove it.
Posted: 29 Aug 2017 | Published: 02 Aug 2017


As Learning Hinges On Devices And Applications, Challenges Increase For IT
sponsored by IBM
WHITE PAPER: Explore the importance of putting security measures in place to restrict apps, documents and data to specific users and groups, ensuring sensitive data does not end up in the wrong hands. Learn from the education industry on how endpoint management can help you achieve stronger data security.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

IBM

10 Considerations for Moving Your Contact Center to the Cloud
sponsored by Genesys
EBOOK: Explore how to migrate your contact center to the cloud with confidence and uncover 10 essential considerations for selecting a trusted partner.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

Genesys

How UCAS Enhanced Customer Service Through Improved Business Application Management
sponsored by Splunk Services UK Ltd
CASE STUDY: In this case study, learn how UCAS, a UK-based charitable organization, improved their customer experience and analytics visibility, security of personal data and much more by deploying Splunk Enterprise and S.o.S.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

Splunk Services UK Ltd

Making Cloud Work for Business
sponsored by NTT Communications Corporation
WHITE PAPER: Download this resource to learn how in just 5 short steps, you can take ahold of your cloud initiative, and overcome the biggest barrier to adoption—security.
Posted: 28 Aug 2017 | Published: 31 Dec 2016

NTT Communications Corporation

How Stronger Governance Enables Distributed BI
sponsored by Qlik
WHITE PAPER: Find out how to overcome challenges like lingering data silos, data security, and establishing a single source of truth. Learn how a strong governance program and a distributed BI model can optimize BI and analytics.
Posted: 25 Aug 2017 | Published: 31 Dec 2016

Qlik

Case Study: Continuous Compliance Capabilities
sponsored by Stratalux
CASE STUDY: DreamWorks Animation wanted to outsource some of its centralized log management to a third party, but had heightened security concerns. Access this case study to learn how DreamWorks was able to outsource their log data management while meeting security concerns, maintaining compliance, and more.
Posted: 25 Aug 2017 | Published: 25 Aug 2017

Stratalux

From Data to Disruption: Innovation Through Digital Intelligence
sponsored by IBM
RESEARCH CONTENT: In this Harvard Business Review Analytic Services report, examine the role played by data, analytics, and automation in organizations' ability to sense and respond to change during the age of digital disruption.
Posted: 25 Aug 2017 | Published: 25 Aug 2017

IBM

Outbound Gateway Protection with UTM on AWS
sponsored by AWS - Sophos
CASE STUDY: Sophos Unified Threat Management (UTM) on AWS/ Comprehensive Network Security for Your Cloud Environment
Posted: 24 Aug 2017 | Published: 19 Jul 2017

AWS - Sophos

AWS Enterprise Data Protection Done Right
sponsored by AWS- Dell EMC
RESOURCE: Tune in at 11 AM PDT on August 30th where 3 industry experts will explore a comprehensive data protection suite hosted on the AWS cloud.
Posted: 24 Aug 2017 | Published: 30 Aug 2017

AWS- Dell EMC

Data Protection Done Right
sponsored by AWS- Dell EMC
WHITE PAPER: Dell EMC Data Protection Suite offers an integrated, cloud-optimized solution to help protect your data and meet your SLAs, both on-premises and on AWS.
Posted: 24 Aug 2017 | Published: 31 Jul 2017

AWS- Dell EMC
76 - 100 of 2553 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement