IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
1 - 25 of 2420 Matches Previous Page  |  Next Page
A Computer Weekly Buyer's Guide to Access Control
sponsored by ComputerWeekly.com
EBOOK: In this 11-page buyer's guide, Computer Weekly looks at why IAM is taking centre stage in business access policies, how IT and security managers can retain control of systems as the workplace changes, and considers the options for extending internal IT management processes to external users.
Posted: 29 Apr 2016 | Published: 03 May 2016

ComputerWeekly.com

Unlocking Business Success The Five Pillars of User Risk Mitigation
sponsored by Forcepoint
WHITE PAPER: This white paper shows you how to embrace a BYOD policy for your organizations and best practices for visibility into all user activity. Access now to gain a formidable defense against both malicious and unintentionally harmful insiders.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Forcepoint

Data Theft Prevention The Key to Security, Growth & Innovation
sponsored by Forcepoint
WHITE PAPER: This white paper shows you a holistic approach to protecting your critical data. Learn about cybersecurity from a Data Theft Prevention perspective, which is broader in scope and more effective in defending sensitive information.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Forcepoint

Six Steps To A Better Security Strategy
sponsored by AllClear ID
WHITE PAPER: In this white paper, you'll learn six steps to create an effective security strategy that's linked with key business interests for great success.
Posted: 29 Apr 2016 | Published: 22 Jan 2016

AllClear ID

How to Protect Patient Data in the Cloud - Best Practices Recommedations
sponsored by Digital Guardian
WHITE PAPER: This white paper shows you best practices for applying DLP to the cloud.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Digital Guardian

Top Cloud Storage Considerations for CIOs
sponsored by Commvault
RESOURCE: Discover in this infographic how to increase IT agility and innovation, and create seamless access to your critical data and applications, by way of cloud infrastructure implementation. Access now to learn why cloud is quickly becoming the top storage choice for companies worldwide, and take advantage of cloud-run DR.
Posted: 29 Apr 2016 | Published: 29 Apr 2016

Commvault

Rapid Recovery, Live Recovery: Recover From a System Failure in Minutes
sponsored by Dell Software
WHITE PAPER: This white paper highlights "live recovery," a recovery solution that instantly runs or resumes physical or virtual machines on any virtual platform, directly from the backup file. Read on to witness a demo of this recovery solution that shows how you can recover a sever failure in a few simple steps,
Posted: 29 Apr 2016 | Published: 29 Apr 2016

Dell Software

Stop Thinking About Your Backups: It's Time to Focus On Recovery
sponsored by Dell Software
WHITE PAPER: This brief white paper highlights four major areas where enterprises should redefine recovery goals, including recovery time objective (RTO), recovery point objective (RPO), day-to-day restoration, and disaster recovery. Read on to learn how you can ensure a more efficient and secure backup and recovery process.
Posted: 29 Apr 2016 | Published: 29 Apr 2016

Dell Software

The Ultimate Guide for Virtual Server Protection
sponsored by Commvault
WHITE PAPER: Are you staying ahead of the tidal wave of consolidation? Read on to discover 4 questions you should be asking about your virtual server data protection. Also, learn how to optimize your storage, cloud or otherwise, to accommodate your rapidly scaled-out virtual infrastructure.
Posted: 28 Apr 2016 | Published: 31 Dec 2015

Commvault

Case Study: Christie Digital Protects Big Data
sponsored by Commvault
VIDEO: In this webcast, witness how Christie Digital utilized a backup and data management solution to ensure their data can be protected and recovered quickly, easily, and efficiently. See how you can secure your virtual environments, regardless of the size of your data volumes.
Posted: 28 Apr 2016 | Premiered: 18 Nov 2015

Commvault

University of Texas at Austin Ensures Network Security for its Distributed Campus
sponsored by Splunk
WHITE PAPER: Access this brief case study to learn how one top-ranked state research university saw significant benefits when they implemented a tool that met the needs of network and information security analysis. Uncover the benefits they achieved by helping their analysts investigate security threats and incidents faster and more accurately.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

Splunk

SG-ISFW-Fortinet
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper teaches you about internal segmentation firewalls that can provide your organization with an additional layer of protection inside your network perimeters. It protects critical assets while enhancing their ability to detect breaches and shorten mitigation delays.
Posted: 28 Apr 2016 | Published: 01 Mar 2016

Fortinet, Inc.

Who's Spying on You?
sponsored by Kaspersky Lab
WHITE PAPER: Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don't get caught in the crossfire. Read our special report "Who's spying on you?" to find out more.
Posted: 28 Apr 2016 | Published: 31 Dec 2015

Kaspersky Lab

Build A High-Performance, Customer-Obsessed Security Organization
sponsored by AllClear ID
WHITE PAPER: This white paper provides CISOs with an end-to-end look at what it takes to build a high-performance security practice. Access now to learn how to build a risk management framework that's designed to support changing business models and retain customer trust.
Posted: 28 Apr 2016 | Published: 09 Feb 2016

AllClear ID

Choosing the Right Public Cloud for Better Data Protection
sponsored by Dell Software
WHITE PAPER: This white paper highlights ways to use infrastructure-as-a-service (IaaS) and data protection software to solve the complexity and cost challenges of protecting data. Read on to discover how to evaluate public cloud capabilities and data protection software capabilities, so that you can choose the right solution for your enterprise.
Posted: 28 Apr 2016 | Published: 31 Dec 2015

Dell Software

Best Practices for Protecting Flash-Based Arrays
sponsored by Dell Software
WHITE PAPER: This white paper covers best practice for protecting flash-based storage arrays and ensuring business processes and operations are agile and responsive. Read on to see how you can successfully transform your backup and recovery software to be more compatible with flash storage.
Posted: 28 Apr 2016 | Published: 31 Dec 2015

Dell Software

Managing Critical Security Controls
sponsored by Splunk
WHITE PAPER: In this e-book, you'll learn what security professionals find suitable to support access controls. Discover ways to verify incoming data, execute the requirements needed, and support human activities associated with a control.
Posted: 27 Apr 2016 | Published: 27 Apr 2016

Splunk

Advanced Threat Protection Buyer's Guide
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper helps you assess your current security posture against a baseline set of requirements. Access now to ensure you're using the right solution set to fit your organization.
Posted: 27 Apr 2016 | Published: 01 Mar 2016

Fortinet, Inc.

Building an Enterprise Security Architecture
sponsored by Forcepoint
WHITE PAPER: This ESG report outlines the current security problems faced by organizations across industries and shows you new methods to tackle them. Access now to learn how you can get an enterprise security architecture built for integration, central command and control, distributed enforcement and comprehensive monitoring.
Posted: 27 Apr 2016 | Published: 01 Mar 2016

Forcepoint

Keeping Email Vulnerability at Bay
sponsored by ArcMail Technology
WHITE PAPER: Access this CIO Review article to learn how email archiving is becoming a common way to fight data theft in enterprises today. Explore email archiving market trends and needs, how to ensure cost effective, continuous security, and more.
Posted: 27 Apr 2016 | Published: 06 Apr 2016

ArcMail Technology

Three guiding principles for data security and compliance
sponsored by IBM
WHITE PAPER: This white paper talks about the world's growing focus on data protection and what current challenges organizations face. Access now to discover why you need a comprehensive approach to data security and learn three guiding principles to achieve better security compliance.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

IBM

IBM Security Guardium Vulnerability Assessment
sponsored by IBM
WHITE PAPER: This white paper teaches you how to harden your data infrastructure by scanning targeted systems on a scheduled basis to detect vulnerabilities. Access now to identify exploitable security holes in your database.
Posted: 26 Apr 2016 | Published: 01 Apr 2016

IBM

Gartner Market Guide for Data-Centric Audit and Protection (DCAP).
sponsored by IBM
WHITE PAPER: This white paper helps CISOs identify emerging data-centric audit and protection tools that they can apply across their data silos. Access now to identify the data security controls required to mitigate risks and threats to your sensitive data.
Posted: 26 Apr 2016 | Published: 15 Dec 2015

IBM

Comprehensive data protection for physical, virtual and cloud infrastructures
sponsored by IBM
WHITE PAPER: This white paper talks about steps you should take to best protect your virtualized cloud data.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

IBM

7 Reasons to Deploy Retail Order Analytics
sponsored by Prelert
MICROSITE: Retailers, especially those involved in eCommerce, are missing a prime tool that would help them run their business: data analysis. Access this resource to learn why data analytics is so important and how to keep your retail business competitive in a changing market.
Posted: 26 Apr 2016 | Published: 01 Apr 2016

Prelert
1 - 25 of 2420 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement