IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
76 - 100 of 2420 Matches Previous Page  |  Next Page
Two-Factor Authentication Helps Officers Protect and Serve New York
sponsored by BlackBerry
WHITE PAPER: Learn how the field officers of the Suffolk County Police Department of Long Island, NY utilize two-factor authentication to protect and serve their constituents, keep their database safe, and enable secure mobility.
Posted: 20 Dec 2016 | Published: 30 Nov 2016

BlackBerry

Autodata Speeds the Delivery of Information with API Management
sponsored by TIBCO Software Inc.
CASE STUDY: This case study explores how Autodata implemented an integrated API management platform to simplify key development processes and create new opportunities for IoT. Discover how they leveraged APIs to improve customer service, enhance data security, and more.
Posted: 20 Dec 2016 | Published: 12 Dec 2016

TIBCO Software Inc.

Protecting the 3 Areas of Secure Mobility
sponsored by BlackBerry
WHITE PAPER: Protect the three areas of secure mobility, whether your users are accessing data locally, on your corporate network, or through a cloud service. Discover how to drive transformative mobility without adding risk to your network and data.
Posted: 20 Dec 2016 | Published: 30 Nov 2016

BlackBerry

Stop Ransomware Before it Starts
sponsored by Carbon Black
EBOOK: There is no single solution to beat ransomware. Learn the history behind ransomware, how it works, and what you can do to protect your valuable assets. Through proper planning and preparations, you can defend your organization and protect your valuable assets.
Posted: 15 Dec 2016 | Published: 30 Nov 2016

Carbon Black

Secure Email Against Targeted Phishing Attacks
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: To protect against targeted phishing attacks and other email-borne malware, you need the ability to identify infected traffic before your users click on it. Discover how you can extract malicious content from all emails before they hit your users' inboxes and neutralize attacks early without impacting user experience.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

Symantec & Blue Coat Systems

McAfee Enterprise Security Manager: Discover. Prioritize. Respond. Adapt.
sponsored by Intel Security
WHITE PAPER: Learn how to optimize security operations with real-time and historical visibility to improve operational efficiency across your entire security infrastructure. Resolve threats faster with fewer resources, reduce complexity and shut down new threats as they emerge.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

Intel Security

Discover the Cloudification of Healthcare IT
sponsored by Pure Storage
RESOURCE: Is clinical data safe in the cloud? Is the cloud compliant? Access this post to hear what your health IT peers have to say about the cloudification of health IT, and their respective decisions to adopt, or not adopt, cloud platforms.
Posted: 09 Dec 2016 | Published: 09 Dec 2016

Pure Storage

An MSP Guide to Selling IT Security
sponsored by Solarwinds MSP
WHITE PAPER: Discover a roadmap to enhance your MSP offering with security services, why you should take a layered security approach, and 5 tips for selling IT security. Access now and unveil how to expand upon your existing toolkit and evolve from MSP to MSSP.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

Solarwinds MSP

Ransomware: Mitigating the Threat
sponsored by Zerto
WHITE PAPER: Discover more about recent advancements in ransomware, where it's going and what you can do you protect your files. Learn steps you must take before a ransomware attack hits to ensure its crippling effects don't threaten your business.
Posted: 07 Dec 2016 | Published: 30 Nov 2016

Zerto

Overcome Storage Capacity Conundrums of Genomics and Precision Medicine
sponsored by Pure Storage
WHITE PAPER: Today's fastest compute environments are prevented from delivering on their promise for genomics as a result of constrained performance of the underlying storage infrastructure. Download this resource to learn how to overcome the capacity constraints of legacy storage and harness the possibility of precision medicine.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

Pure Storage

The Current State of Data Protection in Midsize Organizations
sponsored by arcserve
WHITE PAPER: Discover why and how IT security strategies are evolving from the survey results of 283 IT service providers, resellers and consultants. Discover today's key data protection trends and concerns faced by midsized organizations.
Posted: 06 Dec 2016 | Published: 30 Nov 2016

arcserve

Demo: Next-Gen Antivirus in Action
sponsored by Carbon Black
WEBCAST: Learn how next-generation antivirus protection works in this quick demonstration. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks from owning your database and holding your data hostage.
Posted: 05 Dec 2016 | Premiered: Nov 30, 2016

Carbon Black

APIs and Mobile: Creating an Integrated Physical-Digital Consumer Experience
sponsored by TIBCO Software Inc.
WHITE PAPER: Learn how retailers are leveraging APIs to improve mobile strategies and enhance consumer engagement. Discover how APIs make your digital assets consumable in any sort of app across a variety of platforms, allowing you to improve customer experiences without sacrificing security for sensitive data.
Posted: 02 Dec 2016 | Published: 03 Oct 2016

TIBCO Software Inc.

How Virtualization is Transforming Technology Delivery in Healthcare
sponsored by Citrix and Pure Storage
PODCAST: Tune into this podcast to hear from health IT industry leaders as they discuss how application virtualization is reshaping care delivery and improving IT security.
Posted: 01 Dec 2016 | Premiered: Nov 17, 2016

Citrix and Pure Storage

How Virtualization is Transforming Technology Delivery in Healthcare
sponsored by Citrix and Pure Storage
PRESENTATION TRANSCRIPT: Today's healthcare organizations are struggling to meet the demands of physicians while maintaining security and privacy for patients. Download this resource as industry leaders demonstrate how application virtualization is reshaping care delivery and improving security.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

Citrix and Pure Storage

Reasonable Security Best Practices: Learning From Notable Data Breaches
sponsored by Global Knowledge
WHITE PAPER: Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a data breach. But what is "reasonable security," and is there a definition?
Posted: 01 Dec 2016 | Published: 28 Nov 2016

Global Knowledge

5 Questions to Ask Data Protection Vendors
sponsored by Commvault
WHITE PAPER: Protecting your data is paramount to your business continuity and success, so you should be asking the tough questions to any data protection vendor you're considering. Discover 5 questions to ask data protection and information management vendors.
Posted: 01 Dec 2016 | Published: 30 Nov 2016

Commvault

Comparing Data Protection and Information Management Vendors
sponsored by Commvault
WHITE PAPER: Uncover a comparison of two data protection and information management vendors (Veeam and Commvault). Learn how they compare on 5 important factors that you should be considering when looking to purchase data protection and information management.
Posted: 30 Nov 2016 | Published: 31 Oct 2016

Commvault

Important Considerations for Comparing Data Protection Vendors
sponsored by Commvault
WHITE PAPER: What should you look for when comparing data protection vendors? Discover how factors like the scope of your data, cloud storage and, most importantly, risk should affect your decision.
Posted: 30 Nov 2016 | Published: 31 Oct 2016

Commvault

Building Better Business Analytics to Improve BI
sponsored by Pyramid Analytics
RESOURCE: Many organizations struggle with inefficient, overly complex business intelligence processes that leave them with fragmented data and incomplete information. Learn about a business intelligence platform that empowers users outside of IT to dive into data with the security of a governed analytics environment.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

Pyramid Analytics

EU data protection: Essential guide
sponsored by ComputerWeekly.com
EGUIDE: The European Union's General Data Protection Regulation (GDPR) comes into effect on 25 May 2018. GDPR will introduce new accountability obligations and stronger rights and restrictions on international data flows.
Posted: 24 Nov 2016 | Published: 24 Nov 2016

ComputerWeekly.com

The History of Ransomware
sponsored by KnowBe4
WHITE PAPER: Learn a brief history of ransomware, its evolution and the different malware families it's been a part of. By understanding where ransomware came from and how it's attacked in the past, you can best predict where it's going in the future and design an effective defense strategy for your organization.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Eight Emerging Data Center Trends to Follow in 2016
sponsored by Chatsworth Products Europe
EGUIDE: Learn how to develop a stronger infrastructure plan that embraces the Internet of Things as it becomes more widespread. Discover what Henrique Cecci, a research director at Gartner Inc., believes are the top 8 emerging trends that will affect data center facilities moving forward.
Posted: 08 Dec 2016 | Published: 05 Dec 2016

Chatsworth Products Europe

CW Europe: December 2016 - February 2017
sponsored by ComputerWeekly.com
EZINE: Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.
Posted: 05 Dec 2016 | Published: 15 Dec 2016

ComputerWeekly.com

The Evolution of Enterprise File Sync and Share
sponsored by ibm box
EGUIDE: Enterprise file sync and share (EFSS) tools have evolved significantly over the past few years. Given these changes, it can be difficult to know exactly which business needs any given tool will meet. Read on to gain an understanding of the changes happening in EFSS, the market, which deployment model is best for your organization, and more.
Posted: 22 Nov 2016 | Published: 16 Nov 2016

ibm box
76 - 100 of 2420 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement