IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
76 - 100 of 2379 Matches Previous Page  |  Next Page
Hybrid Cloud & Data Fabric For Dummies
sponsored by NetApp
WHITE PAPER: Hybrid clouds are seeing a growth in adoption rates, but we're also seeing data management challenges arise. This guide explores these challenges to the hybrid cloud model and how a data fabric addresses them.
Posted: 09 May 2017 | Published: 31 Dec 2015

NetApp

MobileIron and iOS: The Security Backbone for the Modern Enterprise
sponsored by MobileIron
WHITE PAPER: Download this white paper to discover an EMM solution that provides a comprehensive platform that protects enterprise information wherever it lives: in the datacenter, in the cloud, in mobile apps, on mobile devices, and in motion between them.
Posted: 09 May 2017 | Published: 09 May 2017

MobileIron

The Investigatory Powers Act 2016 and Internet Connections Records
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
Posted: 09 May 2017 | Published: 09 May 2017

ComputerWeekly.com

Computer Weekly – 9 May 2017: Casting the IT skills net wider
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.
Posted: 08 May 2017 | Published: 09 May 2017

ComputerWeekly.com

Data Center Services: Trust the Professionals
sponsored by Comarch
WHITE PAPER: Whether you have an established data center, or are designing and building one, outsourcing to data center services can help stretch your budget and maximize your ROI. Access this white paper to learn about a data center service provider and IT infrastructure as a service to see how your data center stands to benefit.
Posted: 05 May 2017 | Published: 05 May 2017

Comarch

Solving the Big Challenges of Big Data Governance
sponsored by TechTarget
RESOURCE: As your organization strives to become more data driven, you need to think more strategically about governing the data you're looking to be driven by. Access our expert guide, Data Governance Points Way to Better Business, to gain a better understanding on what you need to know when implementing or managing a data governance program.
Posted: 03 May 2017 | Published: 18 Mar 2014

TechTarget

The Developer's Guide to the DevSecOps Galaxy
sponsored by Veracode, Inc.
WHITE PAPER: Bringing developers and operations staff together under the singular DevOps roof means trying to mesh contradictory approaches, leaving open security concerns. DevSecOps to the rescue! Access this white paper to learn about DevSecOps challenges, best practices, and more!
Posted: 03 May 2017 | Published: 03 May 2017

Veracode, Inc.

Computer Weekly – 2 May 2017: How to deal with data under GDPR
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.
Posted: 01 May 2017 | Published: 02 May 2017

ComputerWeekly.com

Beware the Beastly Threats of IT security
sponsored by Lenovo
WHITE PAPER: It's essential that IT professionals have the right tools to build safeguards against them as battling threats is more critical for organizations than ever— in dollars and in brand reputation. This eBook explores 6 beastly threats scratching at the perimeter of your company's computers and IT networks, and where these threats are trending.
Posted: 01 May 2017 | Published: 01 May 2017

Lenovo

Unified Data Protection Vendor Comparison
sponsored by Veritas
WHITE PAPER: The digital transformation of business requires enterprise data management that delivers protection, availability and insights. See how Veritas and NetBackup provide the easy foundation for enterprise data management. Download this document to learn how Veritas compares to other vendors in the field.
Posted: 27 Apr 2017 | Published: 30 Dec 2016

Veritas

Vendor Comparison Based on Top 8 Data Protection Needs
sponsored by Veritas
WHITE PAPER: NetBackup unified data protection protects all data no matter where it lives: virtual, physical or in the cloud. See how NetBackup provides scale, performance and extensive workload integration from a single console.Download this document to learn how Veritas compares to other vendors in the field.
Posted: 27 Apr 2017 | Published: 31 Oct 2016

Veritas

The currency of trust: why banks and insurers must make customer data safer and more secure
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

ComputerWeekly.com

What to Consider Before Buying Database Performance Monitoring Tools
sponsored by SearchDataManagement
EBOOK: To help you select the right tool, or tools, to meet your organization's particular database needs, this buyer's handbook offers advice from Mullins on the key features and functions to look for across the different product categories.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

SearchDataManagement

How Transactional Analytics is Enabling Digital Payments Transformation
sponsored by Aerospike
WHITE PAPER: Learn how transactional analytics can help you keep up with the rapid changes wrought on eCommerce by technologies like mobile payment apps and non-banking payment service providers (FinTech). Discover how to leverage a database with a hybrid memory architecture and machine learning to transform digital payments.
Posted: 20 Apr 2017 | Published: 20 Apr 2017


Data protection: Not just about personal data and compliance
sponsored by ComputerWeekly.com
EGUIDE: Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.
Posted: 18 Apr 2017 | Published: 18 Apr 2017

ComputerWeekly.com

Don't Rush into Cloud Databases without a Well-Grounded Plan
sponsored by Data Intensity
EGUIDE: In this expert e-guide, DBA Brian Peasland helps you weigh the benefits of moving to the cloud. Discover how to take a strategic approach to implementing an Oracle cloud database that anticipates a variety of challenges from legal regulations to data security.
Posted: 17 Apr 2017 | Published: 07 Apr 2017

Data Intensity

Some Deduplication Solutions Skimp on Security – Yours Doesn't Have To
sponsored by Dell EMC and Intel®
WHITE PAPER: This white paper highlights must-have data security features deduplication should encompass. Access this resource from Dell EMC now and learn about encryption capabilities that back up and protect data being replicated from one system to another, while preserving deduplication bandwidth.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

Dell EMC and Intel®

Dell EMC Global Data Protection Index: The Global Maturity of Data Protection
sponsored by Dell EMC and Intel®
WHITE PAPER: In this infographic, learn what 2,200 IT decision makers from 18 countries had to say about their backup and recovery experiences, strategies, and infrastructure. Access now to see where you stand in comparison.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

Dell EMC and Intel®

Dell EMC Data Protection: Your choice is simple
sponsored by Dell EMC and Intel®
WHITE PAPER: This white paper explores a data protection suite that can provide you protection based on your business specific needs. Learn how you can gain integrated data protection within a variety of environments, deduplication speeds at up to 58.7 terabytes an hour, and more.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

Dell EMC and Intel®

Why Organizations Still Struggle to Digitally Transform & Innovate
sponsored by TechData - Veeam
WHITE PAPER: Over 80% of enterprises deal with a data availability gap. Do you know how many millions that gap is costing you? Access this white paper to learn how to close the availability and protection gaps, quantify your availability goals, see how these challenges are impacting your digital transformation strategies, and more.
Posted: 09 May 2017 | Published: 09 May 2017


5 Ways to Boost Mobile Application Security & Craft an Effective Mobile Strategy
sponsored by BlackBerry
EGUIDE: In an era of mobile everything, organizations must adopt mobility strategies to keep up with their on-the-go workforces. However, IT continues to struggle with mobility issues, from security to cost control. Discover 5 ways to boost your mobile application security and learn how to craft the most effective mobility strategy for your organization.
Posted: 04 May 2017 | Published: 27 Apr 2017

BlackBerry

Top Mobile Security Threats IT Needs to Know About
sponsored by BlackBerry
EGUIDE: In an era of mobile everything, mobile security threats are on the rise and security is becoming increasingly important. Discover the top 5 mobile security threats that should be on your radar and the benefits of security solutions like two-factor authentication.
Posted: 04 May 2017 | Published: 27 Apr 2017

BlackBerry

How to Manage Oracle E-Business Suite Apps and Databases
sponsored by Data Intensity
ESSENTIAL GUIDE: In this expert e-guide, explore how to simplify and achieve a number of tasks that go into managing Oracle E-Business Suite (EBS) and databases, including patch updates, improving security, and managing cost-based optimizer stats.
Posted: 26 Apr 2017 | Published: 20 Apr 2017

Data Intensity

SaaS Analytics: Safe and Certain Reporting
sponsored by IBM
WHITE PAPER: In this white paper, learn how one multi-national firm was able to maintain Cognos while keeping sensitive data on premises. Plus, discover how 2 more companies were able to access data wherever it resides, create efficiencies and cost savings, and more.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

IBM

Ransomware Detection and Prevention Tools You Need Now
sponsored by SearchSecurity.com
EBOOK: Fighting today's malware threats requires a range of ransomware prevention tools. Learn how to tweak the tools you have and identify what new tools you need.
Posted: 13 Apr 2017 | Published: 05 Mar 2017

SearchSecurity.com
76 - 100 of 2379 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement