IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
76 - 100 of 2236 Matches Previous Page  |  Next Page
All-Flash Arrays for Big Data Workloads
sponsored by IBM
WHITE PAPER: This white paper reveals why all-flash storage for big data is a practical option for storing your data.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

IBM

Case Study: Enhancing a Leading Bank's File Monitoring
sponsored by Varonis
WHITE PAPER: This case study describes how a leading bank is able to monitor every bit of its data, down to the last file touch.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Varonis

Insider Threats: The Unexpected Risk
sponsored by Varonis
WHITE PAPER: This white paper reveals just how prevalent insider threats are and gives you advice on stopping them.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Varonis

Why You Need an Audit Trail
sponsored by Varonis
VIDEO: This brief video introduces a way to obtain an audit trail that gives you all the benefits of auditing without any of the drawbacks.
Posted: 25 Jun 2015 | Premiered: 25 Jun 2015

Varonis

Get Control of Cloud Based File Synchronization Services
sponsored by Varonis
WHITE PAPER: In this white paper, discover how you can allow your employees to use file synchronization without putting your data at risk.
Posted: 25 Jun 2015 | Published: 31 Dec 2014

Varonis

Understanding Data Protection Regulations in the US
sponsored by Varonis
WHITE PAPER: This white paper outlines several important security regulations in the United States and gives advice on successfully meeting all of them.
Posted: 25 Jun 2015 | Published: 31 Dec 2014

Varonis

Privacy Compliance Strategies from Leading Records Management Professionals
sponsored by IntraLinks, Inc
EGUIDE: This expert e-guide explores records and information management (RIM) professionals, and their likelihood to play a big role as businesses place increasing importance on privacy compliance. Uncover an interview with RIM expert John Isaza for insights on developing these programs.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

IntraLinks, Inc

Top Five Things to Look for in Software-Defined Storage
sponsored by IBM
WHITE PAPER: This informative white paper reveals the top 5 things to look for in an SDS solution and SDS provider.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

IBM

Five Things You Must Know About Microsoft BitLocker
sponsored by WinMagic
WHITE PAPER: This white paper presents a 5 step strategy to resolve all BitLocker security issues.
Posted: 25 Jun 2015 | Published: 17 Jun 2015

WinMagic

Ignore Compliance, Focus on Security
sponsored by FireHost Inc.
WHITE PAPER: This white paper explores how enterprises that focus on security first to address an organization's sensitive data will solve compliance requirements along the way. Instead of following a compliance checklist, learn to tackle the 5 risk assessment methodologies to mitigate threats and ensure confidentiality.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

FireHost Inc.

The Peripheral You're Not Managing, and The Risk It Poses
sponsored by Nuance
WEBCAST: This webcast discusses the hidden security risk multi-function printers and other devices pose and gives advice for mitigating that risk.
Posted: 25 Jun 2015 | Premiered: Jun 9, 2015

Nuance

NetApp AltaVault Cloud-Integrated Storage
sponsored by NetApp
WHITE PAPER: This solution brief highlights a particular type of storage that enables customers to securely back up data to any cloud at up to 90% less cost compared to on-premises solutions.
Posted: 25 Jun 2015 | Published: 18 Jun 2015

NetApp

Medical Record Privacy: Why Patients are Losing Trust
sponsored by FireHost Inc.
WHITE PAPER: This white paper explores the guidelines healthcare IT organizations must follow to let patients know their privacy is valued as highly as their health.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

FireHost Inc.

Tips For Securing Cloud-Based ECM And Enterprise Collaboration Tools
sponsored by IntraLinks, Inc
EGUIDE: This e-guide explores how companies can use enterprise collaboration tools to brainstorm ideas in a secure, recordable fashion. Join Forrester's Rob Koplowitz as he explains adoption trends for compliant technological teamwork, and learn the competitive potential of deploying sooner than later.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

IntraLinks, Inc

Into the Breach: Lessons from Real Security Incidents
sponsored by Varonis
WHITE PAPER: This white paper outlines three devastating security breaches from start to finish, helping you to learn from the mistakes of these compromised businesses and to better keep yourself safe.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Varonis

Limiting Widespread Data Access
sponsored by Varonis
WHITE PAPER: This white paper discusses the problem of universal access to sensitive data and gives suggestions for solving this problem without interfering with the business process.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Varonis

Case Study: Boston University Achieves Heightened Protection for Sensitive Data
sponsored by Varonis
WHITE PAPER: Access this case study to discover how Boston University implemented DLP that gives insight into both where sensitive data is located and who has access to it.
Posted: 24 Jun 2015 | Published: 01 Jan 2014

Varonis

Waste and Risk: The Problems Posed by Printers
sponsored by Nuance
VIDEO: This humorous video demonstrates how easily a simple print job can go wrong – and what you can do to stop that from happening.
Posted: 24 Jun 2015 | Premiered: 22 Apr 2015

Nuance

Why Scan to E-Mail Has Made Your Printers a Threat
sponsored by Nuance
VIDEO: This brief video explains why scanning and accidentally e-mailing documents to the wrong place can make your printer one of your company's greatest liabilities.
Posted: 24 Jun 2015 | Premiered: 03 Apr 2015

Nuance

Understand the Threat Landscape
sponsored by IBM
WHITE PAPER: This infographic provides you with some essential statistics regarding the rising problem of cybercrime.
Posted: 24 Jun 2015 | Published: 31 Dec 2014

IBM

Data Breach Risk Calculator
sponsored by IBM
WHITE PAPER: With this risk calculator, you can answer a few simple questions to determine how much your organization would lose in a data breach.
Posted: 24 Jun 2015 | Published: 31 Dec 2014

IBM

What You Need to Know Now for Modern Backup
sponsored by Hewlett-Packard Limited & Intel® (Processor Intel® Xeon®)
WHITE PAPER: This buyer's guide describes the capabilities of an effective data backup system and gives advice for selecting one that both meets your needs and your budget.
Posted: 23 Jun 2015 | Published: 31 Jan 2015

Hewlett-Packard Limited & Intel® (Processor  Intel® Xeon®)

Overcome Three of Today's Biggest End User Pain Points
sponsored by Dell and Microsoft
WHITE PAPER: This resource reveals 3 of the most critical IT challenges centered around end users today, providing tips on addressing these pain points without spending too much time or money doing so.
Posted: 23 Jun 2015 | Published: 22 Jun 2015

Dell and Microsoft

Gain Control of Sensitive Documents
sponsored by Nuance
VIDEO: Take a look at this brief video to discover just how dangerous an insecure printer can be, and to learn what you can do to protect your sensitive documents.
Posted: 22 Jun 2015 | Premiered: 03 Apr 2015

Nuance

It’s Time to Refresh Your Organization’s Laptop Fleet
sponsored by Dell and Microsoft
WHITE PAPER: Access this white paper to explore top tips to help maintain optimal data security as it moves from device to device, without affecting employee productivity. Also, learn the benefits of refreshing client operating systems and how this can be key to keeping your system secure.
Posted: 22 Jun 2015 | Published: 22 Jun 2015

Dell and Microsoft
76 - 100 of 2236 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement