IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
76 - 100 of 2685 Matches Previous Page  |  Next Page
Six steps to control the uncontrollable
sponsored by Microsoft
WHITE PAPER: Your employees need to be productive where and when they want to be. If you don't provide ways for them to accomplish this, they'll do it themselves. So how sure are you that you're in full control of your company? Explore six key focus areas to managing your enterprise's mobility and empowering your employees while ensuring security.
Posted: 18 May 2016 | Published: 04 May 2016

Microsoft

Security essentials for CIO's enabling mobility - their device, your data
sponsored by IBM MaaS360
WHITE PAPER: Your goal is to make BYOD policies feasible by seamlessly securing corporate data on the device while providing logical separation from personal activities. Learn five key steps you should consider before putting your BYOD program in place.
Posted: 18 May 2016 | Published: 31 Dec 2012

IBM MaaS360

Controlling the uncontrollable
sponsored by Microsoft
WHITE PAPER: 29% of workers use three or more devices, work from many locations, and use many apps, and this number is growing. The problem is enabling employees without compromising security throughout the enterprise. Read on to learn about an enterprise mobile management solution that will make the process easier than you may realize.
Posted: 18 May 2016 | Published: 11 May 2016

Microsoft

Enable Better Decisions for Everyone in Your Organization
sponsored by Pyramid Analytics
WHITE PAPER: Many organizations struggle with inefficient, overly complex business intelligence processes that leave them with fragmented data and incomplete information. Discover a business intelligence platform that empowers users outside of IT to dive into data, with the security of a governed analytics environment.
Posted: 18 May 2016 | Published: 18 May 2016

Pyramid Analytics

The State of Mobile Application Insecurity - Ponemon Institute Research Report
sponsored by IBM MaaS360
RESOURCE: This Ponemon Institute study, which encapsulates 640 individuals involved in the application development and security process, will help you understand how organizations are reducing the risk of unsecured mobile apps used in their business practices.
Posted: 18 May 2016 | Published: 28 Feb 2015

IBM MaaS360

Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud
sponsored by Equinix
PODCAST: Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery solutions to protect important data. Access now to see how hybrid cloud DR and BC can enable your enterprise to efficiently recover full systems and implement automatic backups that can reduce your RPO and RTO.
Posted: 18 May 2016 | Premiered: Apr 18, 2016

Equinix

Read this before attempting network microsegmentation
sponsored by VMware
EGUIDE: Microsegmentation is emerging as an essential networking, data center and security tool, but it's a difficult tool to master. This expert guide reveals the technology's benefits and disadvantages, considerations to take into account during the adoption process and what kind of services vendors are offering.
Posted: 17 May 2016 | Published: 04 May 2016

VMware

The Intricacies of Securing Data in the Cloud and How to Implement Policies Successfully
sponsored by Intel
EGUIDE: This e-guide helps you put together a cloud security policy for your organization as your business practices rely more heavily on cloud storage. Access now for help with creating policies for storing and securing different data types, authorizing who can migrate data and choosing which applications can access your data.
Posted: 17 May 2016 | Published: 09 May 2016

Intel

Encrypt Everything How to Unshare and Secure Your Sensitive Data Wherever It Resides
sponsored by Gemalto
WHITE PAPER: Encryption is the key to unsharing your sensitive data. Learn a multitier plan that helps you protect your perimeter while also encrypting data in every level, moving or at rest. Identify where your sensitive data lives to better understand your IT environment.
Posted: 17 May 2016 | Published: 01 Apr 2016

Gemalto

Market Focus Double Vision
sponsored by Gigamon
WHITE PAPER: It's time to get real with security realities. Understand how to achieve greater visibility into your network traffic and learn where other organizations stand in the cyber security war.
Posted: 17 May 2016 | Published: 01 Feb 2016

Gigamon

Implementing New Technology: Software-Defined Storage
sponsored by IBM
EGUIDE: Jon Toigo, chairman of the Data Management Institute, discusses how to efficiently set up software-defined storage (SDS) products so that users can achieve enhanced performance and capacity. Access now to learn how to successfully leverage the capabilities of SDS.
Posted: 17 May 2016 | Published: 13 May 2016

IBM

What is Software-Defined Storage and What Can I Do with It?
sponsored by IBM
EGUIDE: Storage analyst George Crump digests the true definition of software-defined storage and discusses how to achieve the true benefits of SDS; the ability to drive down costs and tie it into existing virtual infrastructure. Read on to determine if implementing an SDS solution is right for your enterprise.
Posted: 17 May 2016 | Published: 13 May 2016

IBM

Ten ways to save money with IBM data protection
sponsored by IBM
WHITE PAPER: Discover 10 ways you can employ your data protection system to help you organize files while addressing modern data protection challenges, and save money.
Posted: 17 May 2016 | Published: 31 Jul 2015

IBM

Enterprise Security Innovation on the AWS Cloud
sponsored by Unisys
WHITE PAPER: One security leader optimized its offerings to give AWS customers a fast and convenient way to protect their data and applications against evolving threats. Discover ways to easily integrate additional protection, comply with regulations, and micro-segment off your virtual machines from neighbors when working on the cloud.
Posted: 17 May 2016 | Published: 19 Jan 2016

Unisys

Five Tips to Make your Data Protection Strategy more proactive
sponsored by Intel Security
WEBCAST: Gain critical albeit little-known tips & tactics to make your data protection strategy more proactive as analysts from the Foundstone Services' Detection and Response team deliver and an in-depth technical discussion on data loss prevention (DLP) policies, implementations, and deployments.
Posted: 17 May 2016 | Premiered: Apr 1, 2016

Intel Security

The data protection playbook for all-flash storage
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Find out how flash storage can offer enterprises the top-notch data protection they need, all while delivering unsurpassed performance, flexibility, and return on investment. Read on to learn how else the right flash investment can improve your business now and in the future.
Posted: 17 May 2016 | Published: 17 May 2016

Hewlett Packard Enterprise

Governing the Complications of Social Media Security and Compliance
sponsored by Actiance
EGUIDE: In this exclusive e-guide, technology law expert Jeffrey Ritter discusses the obstacles of governing social media security in 21st century business and what you can do to protect sensitive company information.
Posted: 17 May 2016 | Published: 11 May 2016

Actiance

Data Privacy and Protection: 5 Insights from the Experts
sponsored by Iron Mountain
EBOOK: With major data breaches in the news nearly every day, the privacy of business information is on the minds of companies across the globe. Discover exclusive insight from experts on data privacy and protection—and learn how new data privacy laws affect records management, 5 steps to redefining your retention policies, and more.
Posted: 17 May 2016 | Published: 17 May 2016

Iron Mountain

Benefits of Building a Digital Business on an Integration Foundation
sponsored by Axway
TRANSCRIPT: As the number of connected "things" increases, enterprise data is becoming more vulnerable and waiting to be exploited. All this data needs to be managed and integrated into business processes to secure the future of your digital ecosystem.
Posted: 17 May 2016 | Published: 26 Apr 2016

Axway

Building a Digital Business on an Integration Foundation
sponsored by Axway
PODCAST: In today's connected world, all of your company's data needs to be managed, visualized and integrated into business processes to secure the future of your digital ecosystem. Learn how to best protect the giant influx of complex data flow and monitor this data end-to-end as it flies through your ecosystem.
Posted: 17 May 2016 | Premiered: May 3, 2016

Axway

E-Waste Is More Than Just Clutter
sponsored by Iron Mountain
WHITE PAPER: Do you dispose of, repurpose or recycle your old IT assets and technology? Explore why and how you should create a secure and frequent IT asset disposal program for your organization to stay compliant, safe, and clutter-free.
Posted: 17 May 2016 | Published: 31 Dec 2015

Iron Mountain

Why IT Leaders Are Buying into Mobile Security
sponsored by Lookout
WHITE PAPER: As mobile devices continue to play a major role in productivity, the likelihood for targeted cyber-attacks will continue to intensify. Discover how CIOs prioritize their mobile security investments today, and ensure mobility doesn't become a liability to your organization—even with the risk of data breach.
Posted: 17 May 2016 | Published: 17 May 2016

Lookout

Data Exfiltration in Depth
sponsored by Intel Security
WEBCAST: Data exfiltration and data loss prevention experts go in-depth into common data exfiltration techniques and how to detect a possible attack. They'll provide quantitative research about data loss attempts and detail data loss prevention processes and tools.
Posted: 17 May 2016 | Premiered: Apr 1, 2016

Intel Security

Making the Most of Hybrid Cloud for Backup and Archiving
sponsored by Equinix
PODCAST: Data storage experts discuss the approach of implementing a cloud backup and archive solution to improve data reliability and recovery in today's world of big data. Tune in to discover how your enterprise can achieve a greater amount of utility and flexibility when it comes to capturing and utilizing your data, without risking security.
Posted: 17 May 2016 | Premiered: Apr 18, 2016

Equinix

IT Guide: Windows 10 Migration Minus The Complexity
sponsored by Druva Software
WHITE PAPER: With six steps, you can leverage endpoint data protection to help you ease into OS migration. Learn how to craft a migration plan that drastically simplifies the OS refresh process and provides comprehensive data protection and governance foundation for your organization.
Posted: 16 May 2016 | Published: 31 Dec 2015

Druva Software
76 - 100 of 2685 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement