IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
76 - 100 of 2374 Matches Previous Page  |  Next Page
Artificial Intelligence and Machine Learning: Cybersecurity Advances
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at machine learning in security and how recent advances may bolster your defenses.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

SearchSecurity.com

Ransomware: Everything You Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn about ransomware and the different ways it can attack your systems. Find out how to foil ransomware attacks with disaster recovery strategies, respond to an ongoing ransomware attack, recover from attacks that have already entered your system, and more.
Posted: 01 Mar 2017 | Published: 30 Sep 2016

Cisco Systems, Inc.

Data Protection & Privacy: Next Steps and 5 Best Practices
sponsored by HPE and Intel®
WHITE PAPER: The internet and data privacy laws have been on a collision course for some time now – and it's accelerated by digital transformation sweeping across companies. Inside, explore the challenges that global businesses face when confronting the policy environment, and find 5 best practices to help you meet evolving data privacy and security demands.
Posted: 28 Feb 2017 | Published: 28 Feb 2017

HPE and Intel®

Digital Remote Monitoring and How it Changes Data Center Operations and Maintenance
sponsored by APC by Schneider Electric
WHITE PAPER: A lot happens in 10 years, and data center remote monitoring services have come a long way. Access this white paper to learn about digital remote monitoring services, how they support your data center and mobile technologies, and why it's time to replace any lingering offline monitoring.
Posted: 28 Feb 2017 | Published: 30 Dec 2016

APC by Schneider Electric

When Downtime Takes a Bite out of Your Budget
sponsored by Globalscape
EBOOK: Unplanned downtime and data loss will ultimately affect an organization's bottom line. Discover how to develop a robust data protection strategy that helps defend your most critical assets and learn how to create visibility into data transfers, meet compliance, simplify disaster recovery, and more.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Globalscape

Secure Information Exchange in the Digital Age
sponsored by OpenText
WHITE PAPER: Forrester Senior Analyst Heidi Shey answers five questions regarding secure information exchange (SIE) and discusses how digital transformations are changing the way that IT decision-makers have to approach SIE in the digital age.
Posted: 27 Feb 2017 | Published: 31 Jan 2017

OpenText

Your Data on the Move: Taking Back Control of Your Most Precious Asset
sponsored by Globalscape
WHITE PAPER: This white paper examines some of the risk factors organizations face when managing their data and explores best practices for conducting risk assessments. Read on to learn about 3 main risk factors threatening your organization, 3 signs you've lost control of your data, 4 steps to regaining control over your data, and more.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Globalscape

Disaster Recovery Guide: DR in Virtualized Environments
sponsored by Macquarie Cloud Services
WHITE PAPER: Download this essential DR guide to gain insight into the challenges, needs, strategies, and available solutions for disaster recovery and business continuity in 2017, especially for modern, virtualized environments and the public cloud. Additionally, view a BD/DR technology comparison, and fully automated replication architecture.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Macquarie Cloud Services

Seeking secure Wi-Fi
sponsored by MicroScope
EZINE: An issue looking at the issues around wireless networking, the dangers of advertising with some hints of verticals that are spending
Posted: 24 Feb 2017 | Published: 24 Feb 2017

MicroScope

6 Questions Answered About Safe Harbor Getting Struck Down
sponsored by Symantec & Blue Coat Systems
RESOURCE: This infographic quickly answers 6 common questions asked about the repercussions of Safe Harbor being struck down including the origins of the ruling, who the ruling applies to, how to comply with cloud systems, and more.
Posted: 23 Feb 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

Backup target features expand use cases and evolve for better data protection
sponsored by Hedvig Inc
EGUIDE: Disk-based backup targets have evolved to become far more than just cheap disk arrays. It is vital to understand the different capabilities these systems can offer. In this guide discover new features such as in-place recovery - that allows a virtual machine to instantiate its data store directly from an appliance.
Posted: 15 Feb 2017 | Published: 13 Feb 2017

Hedvig Inc

Building Trust in a Cloudy Sky
sponsored by McAfee, Inc.
RESEARCH CONTENT: 90% of companies now use cloud services, not all of it sanctioned by IT. Moreover, more sensitive data is being stored in the cloud outside the visibility and control of IT. Learn more "Building Trust in a Cloudy Sky."
Posted: 10 Feb 2017 | Published: 31 Jan 2017

McAfee, Inc.

Top 10 Reasons Quorum Beats the Competition
sponsored by QuorumLabs Inc.
PRODUCT REVIEW: Discover how Quorum's backup and disaster recovery solution can benefit your enterprise and how they compare to the competition.
Posted: 08 Feb 2017 | Published: 08 Feb 2017

QuorumLabs Inc.

Accelerating Your BDR: 7 Ways to Turn Your Turtle into a Cheetah
sponsored by QuorumLabs Inc.
WHITE PAPER: Discover 7 ways you can accelerate your backup and disaster recovery and stay ahead of your competitors.
Posted: 02 Feb 2017 | Published: 02 Feb 2017

QuorumLabs Inc.

Are we trusting social networks too much?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
Posted: 31 Jan 2017 | Published: 31 Jan 2017

ComputerWeekly.com

Are you one eDiscovery away from a budgetary meltdown?
sponsored by ComputerWeekly.com
ANALYST REPORT: Using an online object storage platform with global namespaces can provide full data protection, high availability and easily managed eDiscovery in a way that fully supports the business, say analysts Clive Longbottom and Marcus Austin.
Posted: 25 Jan 2017 | Published: 25 Jan 2017

ComputerWeekly.com

Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware
sponsored by BlackBerry
WHITE PAPER: With destructive malware ravaging the networks of governments, Aramco, Sands Corporation, and Sony Pictures, you need to adjust your tactics to ensure your continued safety. In this white paper, discover a deeper look at these recent attacks and potential countermeasures to thwart them.
Posted: 23 Jan 2017 | Published: 17 Oct 2016

BlackBerry

Prevention Is Not Always Foolproof: Enter Unified Cloud Backup and Recovery
sponsored by QuorumLabs Inc.
RESOURCE: Download this resource to take a brief but informative look at how unified data backup/DR provides you with the ability to execute instant recovery, offsite replication, archiving, advanced deduplication, and more. Learn how to configure your DR in minutes with a robust DRaaS cloud.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

QuorumLabs Inc.

The 5 Rings of Data Integration Hell Impacting Your Security
sponsored by Globalscape
WHITE PAPER: In this guide discover the 5 "rings of hell" that make meeting data integration requirements difficult and threaten the security of your data. Learn about the various scenarios which can cause data integration challenges, methods for data migration worth considering, and more.
Posted: 11 Jan 2017 | Published: 31 Dec 2016

Globalscape

UBM Dark Reading & VMware AirWatch® Webinar
sponsored by vmware airwatch
WEBCAST: In this session, we'll cover how VMware Workspace™ ONE™ can help drastically simplify the deployment of Office 365 and provide the security controls to protect your sensitive information that is stored in corporate email, OneDrive, and SharePoint.
Posted: 03 Mar 2017 | Premiered: Mar 3, 2017

vmware airwatch

The Current State of Blockchain Compliance
sponsored by BAE Systems Applied Intelligence
EGUIDE: In this expert e-guide, we examine blockchains and how they're affecting digital enterprise assets and cybersecurity. Discover how these distributed ledgers relate to Bitcoin and data security. Plus, learn how blockchain innovation and apps like smart contracts are affecting compliance.
Posted: 01 Mar 2017 | Published: 24 Feb 2017


How to Plan Your Hybrid Cloud Backup Strategy
sponsored by Colospace Inc.
EGUIDE: Considering using hybrid cloud to backup your business? It can get complicated very quickly if you're not sure what you're doing. This e-guide walks you through everything you need to know to establish, or strengthen, your cloud backup strategy.
Posted: 08 Feb 2017 | Published: 06 Feb 2017

Colospace Inc.

Cloud Security and Content Management: Box Case Study
sponsored by IBM
WHITE PAPER: Learn how to secure Box on the cloud, and in doing so yield more benefits than just keeping your data safe.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

IBM

Box: Securing Business Information in the Cloud
sponsored by IBM
WHITE PAPER: Learn how to address content security challenges with Box on the cloud and enable productivity and collaboration with anyone, anywhere, and at any time, while maintaining control and compliance over your business content.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

IBM

ECM and Collaboration: Transforming Work in the Cloud
sponsored by IBM
WEBCAST: This webcast explores how to enable sound content management, even in an era of growing reliance on cloud and mobile computing. Discover how to implement a content strategy that unlocks benefits like simplified end-user experiences, accelerated collaboration, cloud-capable ECM, secure file sync and share across all devices, and more.
Posted: 03 Feb 2017 | Premiered: Feb 3, 2017

IBM
76 - 100 of 2374 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement