IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
76 - 100 of 2634 Matches Previous Page  |  Next Page
Outthinking Cybercrime: Prepare for the Human Factor
sponsored by Trustwave
WEBCAST: Learn some of the key risks associated with defending modern IT infrastructures and see real-world scenarios where human influence is the weak link in security.
Posted: 08 Nov 2016 | Premiered: Oct 6, 2016

Trustwave

Insider Security Threats: What CISOs Can Do to Mitigate Them
sponsored by Preempt Security
EGUIDE: Insider security threats will always exist, but there are steps you can take to limit their impact. Discover how to implement technical access control and authentication to ensure only the right eyes are consuming sensitive data.
Posted: 07 Nov 2016 | Published: 01 Nov 2016

Preempt Security

Computer Weekly – 8 November 2016: The march of the robot workers
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how artificial intelligence is being used to automate existing jobs, such as IT administrators and customer service agents. Capital One's European CIO talks about how to create an agile business. And we offer tips on how to deal with an Oracle software audit. Read the issue now.
Posted: 07 Nov 2016 | Published: 08 Nov 2016

ComputerWeekly.com

Mitigating Security Risk from Partners, Affiliates and Suppliers
sponsored by Dell SecureWorks
WHITE PAPER: Discover tips and guidelines for managing a third party's security posture so that you can strengthen your own. Learn how to assess a third-party's potential risk carefully so you can mitigate the threat of data loss and financial ruin.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Dell SecureWorks

Be Afraid of Your Shadow: What Is Shadow IT? And How to Reduce It
sponsored by Globalscape
WHITE PAPER: Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is "no," then your sensitive data may be vulnerable. In this guide from Globalscape, you'll learn: what shadow IT is and its drawbacks, how to identify signs of a shadow IT problem, how to reduce shadow IT, and more.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Globalscape

Modern Cybercrime: Staying Ahead of The Perfect Storm
sponsored by Trustwave
WEBCAST: Discover how to get ahead of today's cyber threats using simple steps and key strategies. The more you know the better equipped you are to detect and prevent cybercrime - and ultimately protect your business.
Posted: 07 Nov 2016 | Premiered: Jul 20, 2016

Trustwave

Next Level Threats: Stopping Ransom & CEO Email fraud
sponsored by Trustwave
WEBCAST: Ransomware and CEO email fraud cause organizations billions of dollars in losses annually. This webinar reveals valuable insight from researchers, security experts and industry leaders on how to prevent ransomware and CEO fraud.
Posted: 07 Nov 2016 | Premiered: Oct 19, 2016

Trustwave

Using Metrics to Manage Your Application Security Program
sponsored by Veracode, Inc.
WHITE PAPER: This SANs resource help you measure your application security (AppSec) program and ensure AppSec is part of your organization's culture moving forward.
Posted: 07 Nov 2016 | Published: 31 May 2016

Veracode, Inc.

Assessing Application Security: A Buyer’s Guide
sponsored by Veracode, Inc.
WHITE PAPER: In this SANs guide, learn the four-step method for acquiring the services you need to support a comprehensive application security (AppSec) lifecycle security program. Discover what goes into an effective AppSec team and how to acquire the resources necessary for deployment.
Posted: 07 Nov 2016 | Published: 31 May 2016

Veracode, Inc.

Top 5 Reasons Why You Need an AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: A variety of misconceptions lead to the lag in AppSec adoption, but the reality is you need an AppSec program. Learn the top 5 reasons why in this white paper.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Cb Defense: PCI DSS Anti-Virus Assessment
sponsored by Carbon Black
WHITE PAPER: This report shows the findings of Coalfire System Inc.'s independent technical assessment of Cb Defense next-generation antivirus platform.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Carbon Black

Global Data Breach Notification Laws: Meeting Requirements and Mitigating Risks with Endpoint Security
sponsored by Absolute
WHITE PAPER: Discover why endpoint security is an essential component of a layered security strategy. Monitor and control devices to prevent significant data breaches and safeguard your reputation.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

Absolute

Top 6 Security Considerations in Migrating to Microsoft Windows 10
sponsored by Absolute
WHITE PAPER: Examine 6 of the most important IT security considerations in migrating to Windows 10. Discover how persistent endpoint security tools can help you address these challenges and enable your devices to stay secure beyond the operating system upgrades.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

Absolute

Mitigating the Impact of Critical IT Events
sponsored by Splunk Services UK Ltd
WHITE PAPER: In this Quocirca research report, discover how to create effective operational intelligence within your organization to improve coordination between security team members and deal with critical IT events (CIEs) faster.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

Splunk Services UK Ltd

Gaining Support for ITAM: Improve IT Operations Through Data Curation
sponsored by BDNA
VIDEO: Tune into this webinar to learn how to enforce enterprise-wide data consistency and improve IT operations with robust ITAM that transforms multi-source data into actionable business insight.
Posted: 03 Nov 2016 | Premiered: 31 Jul 2016

BDNA

Swisslos Increases Uptime, Improves Customer Experience and Security
sponsored by Splunk Services UK Ltd
WHITE PAPER: This case study explores how the international lottery company Swisslos found a scalable analysis program that could replace their outdated legacy system. Go inside to learn how they were able to respond quickly to security threats, significantly diminished overhead costs, cut-down on IT maintenance time, and more.
Posted: 03 Nov 2016 | Published: 03 Nov 2016

Splunk Services UK Ltd

Infographic: Application-Layer Breaches Persist
sponsored by Veracode, Inc.
WHITE PAPER: See four major examples of application-layer data breaches and the damage they caused. Discover how and why they happened so you can better secure your application software for the future.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Trends and Tactics: How IT Professionals are Approaching AppSec Today
sponsored by Veracode, Inc.
WHITE PAPER: Discover the strategies and tactics being implemented by IT professionals to ensure the security of their applications. Learn the obstacles they're working everyday to overcome and devise a plan of your own to mitigate your app security hardships.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Top 10 Data Security Tips to Safeguard Your Business
sponsored by Absolute
WHITE PAPER: New IT trends typically advance faster than the processes to secure them. However, as high profile data breaches hit the headlines on a daily basis, data protection regulations are catching up. Discover 10 tips on how to safeguard your business.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Absolute

At-Risk Data in the Cloud: 3 Strategies to Stop the Data Bleed
sponsored by Absolute
WHITE PAPER: Learn about each type of insider threat and discover strategies to mitigate their impact on your organization. Visibility through routine scans to discover sensitive data in cloud-sync folders can help IT move from paranoia or a false sense of security to peace of mind.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Absolute

Five Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Discover how to successfully integrate security with DevOps and learn 5 principles your security strategy must address. Furthermore, understand how DevOps and CI/CD are different from Agile development and how this difference changes the requirements for application security.
Posted: 02 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Why the Cloud Should Be Part of Your Data Protection Strategy
sponsored by Microsoft
WHITE PAPER: This white paper explores the role that the cloud plays in strong data protection strategies for agile IT organizations. Access now to learn more about a hybrid approach to data management and cloud-connected backups.
Posted: 01 Nov 2016 | Published: 31 Jul 2016

Microsoft

Five AWS Data Migration Methods to Consider and How to Overcome Common Mistakes
sponsored by UXC Oxygen and Amazon Web Services
EGUIDE: More enterprises are looking to store data in the public cloud, often at a fraction of the cost of on-premises storage. But transferring that data isn't straightforward. Examine 5 data migration methods for moving storage to AWS in this expert guide, as well as 4 additional mistakes to avoid when transferring servers and apps to the cloud.
Posted: 28 Oct 2016 | Published: 26 Oct 2016

UXC Oxygen and Amazon Web Services

Four Top Cybercrime Trends
sponsored by IBM
WHITE PAPER: Today, organizations are going back to the basics. The major cybersecurity trends of recent can largely be addressed by focusing on "security 101." Learn how to reduce enterprise risk and limit attackers' opportunities as much as possible.
Posted: 02 Nov 2016 | Published: 31 Dec 2015

IBM

Reviewing a Year of Serious Data Breaches, Major Attacks and New Vulnerabilities
sponsored by IBM
WHITE PAPER: Discover which industries were hit hardest in 2015 and what these attacks mean for the future. Learn what steps you can take to prepare your security plan for growing threats in 2016 and beyond.
Posted: 02 Nov 2016 | Published: 01 Apr 2016

IBM
76 - 100 of 2634 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement