IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
1 - 25 of 2426 Matches Previous Page  |  Next Page
Dell EMC Data Protection Suite Enterprise Edition Solution Specifications
sponsored by Dell and Microsoft
RESOURCE: Inside learn about what you can gain by adopting the Dell EMC Data Protection Suite Enterprise Edition
Posted: 24 Mar 2017 | Published: 24 Mar 2017

Dell and Microsoft

Making the Case for Modern, Hybrid Laptops in the Legal Profession
sponsored by Microsoft
WHITE PAPER: Modern work means using modern tools – and to find out how legal professionals utilize technology like laptops, desktops, and tablets, Microsoft commissioned a survey of 300 solicitors, barristers, clerks, and paralegals. Learn how intuitive, hybrid laptops modernize work, helps secure data, and more.
Posted: 23 Mar 2017 | Published: 23 Mar 2017

Microsoft

Information Governance: Protect Your Company's Assets
sponsored by Box
WHITE PAPER: This white paper explores how to leverage the cloud content management platform from Box to implement a sound information governance program for you organization. Discover how to reduce risks and gain control over who can see and use information and how it is kept.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

Box

Mobilize Enterprise Data with Citrix ShareFile on Microsoft Azure
sponsored by Citrix
WHITE PAPER: Microsoft and Citrix have come together to deliver a highly secure enterprise file sync and sharing solution, with flexible data storage. Download this resource to discover how the solution is helping IT regain control over employee file sharing and more.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Citrix

Data Governance: Embracing Security and Privacy
sponsored by Tealium
WHITE PAPER: With proper analysis and planning, you can minimize risk, build trust, and protect your brand. This white paper discusses steps to take for building an effective data governance strategy.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Tealium

Hybrid Cloud Storage Strategies
sponsored by IBM
VIDEO: Hybrid cloud is the storage option that gives customers the flexibility and scalability they need at the cost they want, but needs to be properly managed for you to realize any of these benefits. Watch this brief interview to learn about hybrid cloud storage strategies and how to make the most of your cloud investment.
Posted: 21 Mar 2017 | Premiered: 22 Sep 2016

IBM

The Definitive Guide to Data Protection and Disaster Recovery on Enterprise Clouds
sponsored by Nutanix
EBOOK: Access this e-book to examine important challenges and trends in availability and data protection. You will learn about a simple, cost-effective approach that works with enterprise cloud computing that helps you not only catch up, but future-proof your data protection.
Posted: 21 Mar 2017 | Published: 30 Jun 2016

Nutanix

The Definitive Guide to Hyperconverged Infrastructure
sponsored by Nutanix
EBOOK: Hyperconverged infrastructure has emerged to become the building block of your enterprise cloud. Access this comprehensive guide to learn everything you need to know to get started in your search for a hyperconverged infrastructure platform.
Posted: 20 Mar 2017 | Published: 20 Mar 2017

Nutanix

5 Steps To Defining Your Data Retention Policies
sponsored by Iron Mountain
WHITE PAPER: Not having a strong data retention plan could end up not only costing you storage space, but could also harm your bottom line. Use this blog post to help you outline your data retention policies in five simple steps.
Posted: 17 Mar 2017 | Published: 13 Jan 2016

Iron Mountain

2017 Analyst Report for Application Security Testing
sponsored by IBM
WHITE PAPER: In this report, analysts review 18 application security testing (AST) tools. Learn which ones improve coordination between development and security teams.
Posted: 16 Mar 2017 | Published: 16 Mar 2017

IBM

Investing in the Data Center to Meet Modern Customer Demands
sponsored by Red Hat
PRESENTATION: Data center modernization is one way to boost digital transformation and innovation efforts. Read on to see what Forrester found in their research on how organizations are going about their modernization, the benefits they are realizing, and more.
Posted: 16 Mar 2017 | Published: 07 Dec 2016

Red Hat

Cyber-physical attacks: Dawn of a new age in cyber-warfare?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series explores the application of cyber power in international relations
Posted: 14 Mar 2017 | Published: 14 Mar 2017

ComputerWeekly.com

Identify and Manage Fraud Better with Analytics
sponsored by BAE Systems
WHITE PAPER: This white paper explores how to put the right analytics tools and practices in place to fight financial crime in an era of cloud and big data. Discover how predictive analytics can help identify fraudulent behavior and improve strategic decision-making even in the face of high data volumes and proliferating attack vectors.
Posted: 14 Mar 2017 | Published: 14 Mar 2017

BAE Systems

Infographic: A New Dawn for Data Privacy
sponsored by Symantec & Blue Coat Systems
RESOURCE: EU General Data Protection Regulation (GDPR) will be implemented in 2018, introducing a new era in data security. In this infographic, learn what you need to know about GDPR and how it will affect your enterprise.
Posted: 08 Mar 2017 | Published: 30 Dec 2016

Symantec & Blue Coat Systems

EMM Real Benefits in Today's Mobile World
sponsored by vmware airwatch
WHITE PAPER: The economy isn't standing still. For your business to succeed, your employees shouldn't either. This eBook relays the importance of unifying your infrastructure to deliver apps effectively across multiple devices. Learn how to stay on top of security and consistency with enterprise mobility management.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

vmware airwatch

Five Key Indicators that You Need to Adopt EMM Now
sponsored by vmware airwatch
WHITE PAPER: How do you know if your organization is ready to make the move to enterprise mobility management (EMM)? Read this white paper to determine if it is the right time to adopt EMM, especially if your organization experiences: Increased need for security and compliance, device expansion or rapid growth.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

vmware airwatch

Digital Innovations and Changing Demographics are Redefining Government by the People, for the People
sponsored by HPE and Intel®
WHITE PAPER: Access this paper to learn about communicating with the different generations of people and how you'll have to handle your data. Learn how to find the right mix of traditional IT, cloud, security and mobility to provide the greatest service possible.
Posted: 07 Mar 2017 | Published: 30 Dec 2016

HPE and Intel®

CW Europe – March 2017
sponsored by ComputerWeekly.com
EZINE: Technology advancements in recent years have brought about huge social challenges. Artificial intelligence and big data, for example, have gained the serious attention of policy makers across the world.
Posted: 06 Mar 2017 | Published: 09 Mar 2017

ComputerWeekly.com

Customer Success Stories: Unified Endpoint Management
sponsored by vmware airwatch
EBOOK: End users expect to be able to work anywhere, at any time, and from any device. They expect a similar experience for accessing work apps and data across all their devices. Download now to learn why leading organizations around the world rely on VMware AirWatch unified endpoint management for their enterprise mobility solution.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

vmware airwatch

Advanced Detection of Existing, New and Evolving Cybersecurity Threats
sponsored by BAE Systems
WHITE PAPER: According to security experts, SIEM is currently catching less than 1% of successful advanced threats. Learn how to go beyond SIEM and discover how to incorporate a data platform with advanced threat analytics, big data capabilities, and an investigation console into your cybersecurity strategy.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

BAE Systems

Managing Cybersecurity Risk: How Directors and Corporate Officers Can Protect Their Businesses
sponsored by BAE Systems
WHITE PAPER: Go beyond simple risk management by implementing cybersecurity practices designed not only to prevent breaches but anticipate the damage and recover from attacks. Discover how to bolster endpoint security and data loss prevention by identifying potential attackers to improve your organization's threat awareness and put the right tools in place.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

BAE Systems

Managing Cultural Change When Moving to the Cloud
sponsored by Box
VIDEO: This webcast examines the technology that Hillwood leveraged to meet and conquer challenges like slow, specialized file sharing, and using email to send files back and forth. Discover the modern content management and collaboration platform they implemented to enable secure and easy file sharing.
Posted: 06 Mar 2017 | Premiered: 31 Jul 2016

Box

The Massive Mobile Migration
sponsored by IBM
WHITE PAPER: The move to mobile devices, data and apps to make work happen anytime, anywhere is continuing to experience massive adoption. Download this infographic to see the numbers you can't ignore this year.
Posted: 03 Mar 2017 | Published: 27 Apr 2016

IBM

UBM Dark Reading & VMware AirWatch® Webinar
sponsored by vmware airwatch
WEBCAST: In this session, we'll cover how VMware Workspace™ ONE™ can help drastically simplify the deployment of Office 365 and provide the security controls to protect your sensitive information that is stored in corporate email, OneDrive, and SharePoint.
Posted: 03 Mar 2017 | Premiered: Mar 3, 2017

vmware airwatch

7 Ways Windows 10 Changes the Enterprise
sponsored by vmware airwatch
EBOOK: Read this new flipbook to unlock insights into the seven game-changing features that make Windows 10 "ready for today's mobile-cloud era" —and how IT can deliver a cloud-first unified approach to modern OS management and security.
Posted: 03 Mar 2017 | Published: 30 Dec 2016

vmware airwatch
1 - 25 of 2426 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement