IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
1 - 25 of 2627 Matches Previous Page  |  Next Page
A Data Privacy & Security Year in Review: Top 10 Trends and Predictions
sponsored by Delphix
WEBCAST: Learn about the top 10 data security trends that developed throughout 2017. Plus, uncover 5 predictions about the future of data privacy and learn about a platform that integrates data masking and delivery to simplify security.
Posted: 15 Dec 2017 | Premiered: Dec 6, 2017

Delphix

Citrix Ready Identity and Access Management Partner Program
sponsored by Citrix Ready
WHITE PAPER: Download this white paper to find out how a unique partner program with Citrix and Identity and Access Management products creates a secure digital workspace and secure digital perimeter by combining secure access to apps and data with contextual control, visibility and behavior analytics across devices, networks and clouds.
Posted: 15 Dec 2017 | Published: 15 Dec 2017

Citrix Ready

Painful Lessons Breaches Teach Us About DevOps and Security
sponsored by CyberArk Software, Inc
WHITE PAPER: As organizations adopt cloud-based environments and DevOps pipelines, privileged account credentials and secrets are shared across interconnected business ecosystems. This report offers awareness into the security of DevOps and provides strategies organizations can take to advance their security when dealing with privileged accounts.
Posted: 14 Dec 2017 | Published: 14 Dec 2017

CyberArk Software, Inc

Splunk's Top Predictions for AI, Machine Learning, IoT, and More
sponsored by Splunk
WHITE PAPER: AI and machine learning, IoT, DevOps collaboration, security and more – how can you tell which factors will be a flash in the pan vs. trends that will have an everlasting effect on the shape of the data management landscape? Uncover Splunk's top predictions to find out what trends will help shape 2018.
Posted: 14 Dec 2017 | Published: 14 Dec 2017

Splunk

Data Defense Doesn't Win Championships
sponsored by Delphix
RESOURCE: Learn about the DataOps approach and how it could help businesses continuously deliver secure access to data throughout its lifecycle.
Posted: 13 Dec 2017 | Published: 13 Dec 2017

Delphix

Compare enterprise file-sync-and-sharing software and deployment options
sponsored by Insight
EGUIDE: Download this e-guide to take a look at different EFSS technologies and cloud deployment models. You'll learn how different vendors stack up in terms of security, user experience, collaboration capabilities, file synchronization and more.
Posted: 12 Dec 2017 | Published: 08 Dec 2017

Insight

Compare the top enterprise file-sync-and-sharing vendors
sponsored by Insight
EGUIDE: Enterprise file sync-and-sharing allows for simpler file access and sharing on the consumer and business level, but with so many vendors in the market it can be difficult to compare options. Download this e-guide to learn about the different capabilities of various vendors and what they can do for your mobile EFSS needs.
Posted: 12 Dec 2017 | Published: 08 Dec 2017

Insight

Data Management Platforms for GDPR: Buyer's Checklist
sponsored by Delphix
RESOURCE: Get ready for the coming changes to compliance and data privacy being ushered in by GDPR, and use this handy checklist to help ensure your data management tools and techniques will be ready for the new regulations.
Posted: 12 Dec 2017 | Published: 31 Oct 2017

Delphix

GDPR Requirements for Data Masking
sponsored by Delphix
WHITE PAPER: This white paper takes a look a data masking – one of the many techniques businesses can take advantage of when getting ready for the GDPR. Learn more about what data masking is and find out how to improve protection for sensitive data.
Posted: 12 Dec 2017 | Published: 30 Sep 2017

Delphix

Who Owns Your Data?
sponsored by SailPoint Technologies
EBOOK: 7 in 10 users have access to data they shouldn't, according to SailPoint's Market Pulse Survey. This e-book explores IAM and data protection strategies to ensure your organization is taking the correct precautions when protecting access to your data.
Posted: 12 Dec 2017 | Published: 12 Dec 2017

SailPoint Technologies

You Need an Action Plan for the GDPR
sponsored by SailPoint Technologies
RESOURCE: It's time to create an action plan to tackle GDPR. This 10-page Forrester Report offers GDPR assistance to security and privacy professionals in preparing data protection strategies to comply with 5 core requirements of the regulation.
Posted: 11 Dec 2017 | Published: 11 Dec 2017

SailPoint Technologies

Banking on Cybersecurity
sponsored by HyTrust
WHITE PAPER: According to PWC's Global Economic Crime Survey, cybercrime has jumped to the second-most reported economic crime and financial organizations are prime targets. This white paper offers best practices to strengthen data security and regulatory compliance in financial services.
Posted: 11 Dec 2017 | Published: 11 Dec 2017

HyTrust

DataOps for Data Privacy and Security
sponsored by Delphix
WHITE PAPER: Learn about a secure data management platform that facilitates collaboration between DBAs, information security pros, analysts, IT operations, and more. Plus, find out how you can drive digital transformation with a comprehensive DataOps approach.
Posted: 11 Dec 2017 | Published: 30 Nov 2017

Delphix

Stopping the Insider Threat
sponsored by SailPoint Technologies
WHITE PAPER: Insider threat is an IAM issue: malicious insiders, by definition, have been granted some level of authorized access and are therefore often harder to detect than bright-line cases of unauthorized access or intrusion. Explore this white paper to gain insight into insider threats and how you can prevent them with a successful IAM approach.
Posted: 08 Dec 2017 | Published: 08 Dec 2017

SailPoint Technologies

Executing a Lockdown on Cybersecurity Threats
sponsored by Navex Global
EBOOK: Cybersecurity preparedness and keeping up with the latest developments in security is essential in protecting your organization. This e-book addresses tactics to mitigate risks of cybersecurity threats and offers strategies to take if your organization has been attacked.
Posted: 08 Dec 2017 | Published: 08 Dec 2017

Navex Global

Report: IAM Leadership Compass
sponsored by Janrain
WHITE PAPER: This 53-page report provides an overview of the market for consumer IAM and provides you with a compass to help you find the IAM strategy that best meets your needs.
Posted: 08 Dec 2017 | Published: 08 Dec 2017

Janrain

Effective Isolation and Workload Security in the Multi-Tenant Cloud
sponsored by HyTrust
RESOURCE: A major challenge for multi-tenant cloud environments is the lack of access control or infrastructure segmentation required for effective isolation of critical workloads. This product overview offers a cloud security strategy that will help you mitigate the challenges of effectively securing cloud environments.
Posted: 08 Dec 2017 | Published: 08 Dec 2017

HyTrust

Security Solutions for Public Sector Virtual Infrastructure
sponsored by HyTrust
RESOURCE: Explore this product overview to evaluate if this cloud security strategy, which secures critical environments in the cloud, is right for your organization's needs.
Posted: 08 Dec 2017 | Published: 08 Dec 2017

HyTrust

Customer IAM Analysis
sponsored by Janrain
WHITE PAPER: In this white paper, gain insight into customer IAM strategies and key capabilities to keep in mind when evaluating the right approach for your organization.
Posted: 07 Dec 2017 | Published: 07 Dec 2017

Janrain

Key Considerations in Selecting a Customer IAM Solution
sponsored by Janrain
WHITE PAPER: The rise of the social customer creates opportunities for organizations to develop deeper relationships with customers in support of business objectives. Explore this white paper to gain insight into selecting a customer IAM strategy that works best for your organization.
Posted: 07 Dec 2017 | Published: 07 Dec 2017

Janrain

GDPR Primer and Readiness Assessment
sponsored by Janrain
RESOURCE: This data sheet provides a GDPR readiness assessment to ensure your organization will achieve compliance by May 2018.
Posted: 07 Dec 2017 | Published: 07 Dec 2017

Janrain

GDPR & Data Protection Webcast
sponsored by Oracle
VIDEO: Take an in-depth look at this data protection and GDPR webcast to learn more about the regulation and uncover relevant compliance strategies. In addition, hear from a business consultant from the Dutch Ministry of Economic Affairs regarding their experience implementing a data protection strategy.
Posted: 07 Dec 2017 | Premiered: 01 Dec 2017

Oracle

Report: Customer Identity and Access Management
sponsored by Janrain
RESOURCE: In this Forrester report, explore a 20-criteria evaluation of customer IAM providers to help security pros make the right choice for their digital business.
Posted: 06 Dec 2017 | Published: 15 Jun 2017

Janrain

GDPR Security Strategies
sponsored by Oracle
VIDEO: The GDPR is coming quickly and requires heightened security and compliance with data protection regulations. Take an in-depth look at this webcast to uncover security strategies for GDPR compliance preparation.
Posted: 06 Dec 2017 | Premiered: 01 Dec 2017

Oracle

SmartProtect Program: Solution Brief
sponsored by Corero Network Security
RESOURCE: To avoid damage to reputation and brand, organizations are looking for DDoS mitigation techniques that have evolved to meet the changing threat landscape. Take a look at this technology overview to decide if this DDoS protection strategy is right for your organization's network security needs.
Posted: 06 Dec 2017 | Published: 06 Dec 2017

Corero Network Security
1 - 25 of 2627 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement