cyber attack

Results 276 - 300 of 457Sort Results By: Published Date | Title | Company Name
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Time has become a critical capability in being able to extract the business value enterprises want from their data and computing infrastructure, as well as to protect the business value that has already been created. In multiple areas of cyber security, time is currently working in favor of the attackers — and time is the strategic advantage that the defenders need to regain. In this report, Aberdeen Group provides four illustrative examples of how recapturing an advantage of time can help defenders to reduce their risk, in the fundamental categories of data protection, threat detection and incident response, data center / cloud security, and endpoint security.
Tags : 
cyber, security, defenders, business value, infrastructure, data, business, protection
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Das war ein heißer Winter für die Cyber-Sicherheit! Im vergangenen Herbst betrat Cyber-Sicherheit ernsthaft politisches Territorium. In den USA gab es Angriffe auf Gruppierungen, die mit beiden großen politischen Parteien in Verbindung stehen, was auf Beeinflussungsversuche auf die US-Präsidentschaftswahl hinweist. Das Problem wurde auch bei einer der Präsidentschaftsdebatten aufgegriffen, als einer der Moderatoren fragte: „Unsere Institutionen werden mit Cyber-Attacken angegriffen und unsere Geheimnisse gestohlen. Daher stellt sich mir die Frage: Wer steckt dahinter? Und wie können wir uns zur Wehr setzen?“
Tags : 
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Mar 14, 2018
Machine learning is all around us, from our smart home applications to driverless automobiles. The efficiency of automated decision-making is changing the game in cybersecurity, expanding the capabilities of humans by sifting through enormous quantities of data and presenting it as actionable intelligence. Machine learning makes security teams better, and vice versa. Human-machine teams deliver the best of both worlds, allowing endpoint security to continually evolve to stop new attack tactics. Your team deserves the best that cybersecurity has to offer, and today the best endpoint security products leverage machine learning.
Tags : 
    
McAfee EMEA
Published By: Panda Security     Published Date: Feb 27, 2008
E-mail is the primary communication tool upon which every business and corporation depends.  This communication source is also the battleground where cybercriminals use sophisticated email infiltration-techniques to propagate malware and attack corporate networks.
Tags : 
malware, hacker, hacking, hackers, email security, e-mail security, panda, panda security, denial of service, dos, phishing, spyware, network security, anti spyware, anti virus, ddos, vulnerability management
    
Panda Security
Published By: Webroot UK     Published Date: Jan 30, 2014
In 2014, hackers and cyber thieves will continue to change their tactics, using new exploits to infect systems and steal data. This Executive Brief discusses the top five malware trends to keep an eye out for in 2014 and how Webroot SecureAnywhere can provide the endpoint protection that companies will need to be safe in 2014.
Tags : 
webroot, security, esecurity, cyber threat, malware, malware trends, breaches, safeguard, data protection, ddos attacks, web gateway security, online threats, virus, spyware protection, anti-phishing protection
    
Webroot UK
Published By: INetU Managed Hosting     Published Date: Oct 09, 2015
The way attackers are going after corporate data and infrastructure these days means that it’s not a matter of if, but when you’ll be forced to buy a ticket for the post-breach rollercoaster. But a little preparation and planning can go a long way toward making the ride as manageable and inexpensive as possible. This eBook walks you through how to get started on planning and executing an incident response for your business.
Tags : 
data breach, cyber-attack, cloud, post-breach, breach, hosting, response plan, security, migration, network security, remote access, cloud computing, content management
    
INetU Managed Hosting
Published By: Lenovo and Intel®     Published Date: Oct 14, 2016
Is Windows 10 right for your business? Get All the Answers in This Comprehensive Guide to Windows 10. Making the decision to upgrade your OS in a multi-platform environment can be scary, and worse, risky! Put your mind at ease with this detailed guide to Windows 10 and Enterprise: Upgrade the Way You Work. You'll get details on: • All the new features • Security upgrades • Migration options Get the whitepaper now.
Tags : 
technology solutions, customer feedback, software, data security, encryption, cyberattacks
    
Lenovo and Intel®
Published By: Oracle     Published Date: Jun 20, 2016
The number one technology issue in the C-suite today is cyber-security. And there’s no wonder—attacks are becoming more numerous and more sophisticated than ever. The cost of cyber-crime to the global economy has topped more than $445 billion2 – equivalent to 1% of global GDP. Sometimes cyber-crime can seem unstoppable – while firms spent more than $75 billion on cyber-defences in 20153 , cyber-crime grew by 38% that year. That’s why C-suite executives everywhere are asking: What can we do to make a difference in defending against hackers, cyber-criminals and digital spies?
Tags : 
    
Oracle
Published By: Delta Risk     Published Date: Jun 07, 2016
Nowhere else could that wise advice be more relevant than in contemplating the effects of cyber attacks on financial institutions. As stated in a recent issue of the FDIC’s Supervisory Insights, the risks presented by cyber attacks have become “one of the most critical challenges [in the last decade] facing the financial services sector due to the frequency and increasing sophistication of cyber attacks.” In just a year’s time, from 2014 to 2015, the occurrence of security incidents increased 38 percent as reported in a survey of 10,000 security, IT, and executive personnel. Just as concerning, the attackers perpetrating these breaches were able to compromise the victim organization within a matter of minutes in 60 percent of cases.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
Delta Risk
Published By: Delta Risk     Published Date: Sep 21, 2016
Nowhere else could that wise advice be more relevant than in contemplating the effects of cyber attacks on financial institutions. As stated in a recent issue of the FDIC’s Supervisory Insights, the risks presented by cyber attacks have become “one of the most critical challenges [in the last decade] facing the financial services sector due to the frequency and increasing sophistication of cyber attacks.” In just a year’s time, from 2014 to 2015, the occurrence of security incidents increased 38 percent as reported in a survey of 10,000 security, IT, and executive personnel. Just as concerning, the attackers perpetrating these breaches were able to compromise the victim organization within a matter of minutes in 60 percent of cases.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
Delta Risk
Published By: Frontier Communications     Published Date: May 01, 2017
This infographic highlights a few common misconceptions about protecting yourself when Mother Nature wreaks vengeance, your workplace becomes a no man’s land, or cybercriminals attack.
Tags : 
    
Frontier Communications
Published By: Tenable     Published Date: Apr 30, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable
Published By: Tenable     Published Date: Apr 30, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
    
Tenable
Published By: BMC     Published Date: Nov 19, 2018
In this book, you learn how SecOps can transform your organization’s security and operations teams to enable a more effective enterprise security posture.
Tags : 
bmc, bmc software, secops, security operations, cyberattacks, cyber criminals, hacking, data breach, network security, hacker detection, intrusion prevention, vulnerability management
    
BMC
Published By: Oracle     Published Date: Aug 19, 2016
Research conducted by the Economist Intelligence Unit shows how firms can improve data security. Certain firms consistently demonstrate success in reducing breaches across all major forms of cyber-attack. 32% of companies named their top security priority as adopting a proactive data defense strategy. Discover eight steps to reduce vulnerability to cyber-attack.
Tags : 
    
Oracle
Published By: Kaspersky Lab     Published Date: Jul 31, 2014
Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe. Download the whitepaper now to learn what you need to create a resilient infrastructure to guard against targeted attacks.
Tags : 
kaspersky, security, cyber attacks, cybersecurity, targeted attacks, data protection, cybersecurity framework, security intelligence
    
Kaspersky Lab
Published By: Kaspersky Lab     Published Date: Aug 14, 2014
Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted to IT security, established businesses like yours are vulnerable to a wider array of attacks. To keep your organization safe, it’s imperative to stay at least a few steps ahead of the bad guys. Do you know where the threats are coming from?
Tags : 
kaspersky, kaspersky lab, security, cyberthreats, corporate cyberthreats, it security, data protection
    
Kaspersky Lab
Published By: ESET     Published Date: Jan 21, 2010
Bots and botnets suck, so what better teaching aid to help people understand them than a vacuum cleaner? It can be extremely challenging to attempt to explain technical concepts to non-technical people. There are two goals for this presentation. Click on this white paper to read about it.
Tags : 
eset, internet security, bots, botnets, national cybersecurity alliance, roomba, remote access tool, denial of service attack, safe computing, remote access, access control, network security appliance, security management
    
ESET
Published By: ESET     Published Date: Feb 11, 2010
Why all the hype? Is cyberwarfare really something enterprise information security professionals should be concerned about? It's hard to know what the next cyber crisis will be, but here are a few best practices that enterprise security teams should consider to avoid becoming victims.
Tags : 
eset, cyberwarfare, threat, enterprise information security, botnet, cyberattack, malware, anti spyware, anti virus, internet security, security management
    
ESET
Published By: Lumension     Published Date: Jan 18, 2013
News of the Flame attack has spread faster than wildfire. While the attack effected only a small number of Endpoints, Flame signifies a new level of cyber threat that all IT security professionals need to understand in-depth.
Tags : 
security, network security, network protection, data security, data protection, cyber attack, case study, encryption, hacker detection, internet security, intrusion detection, intrusion prevention, network security appliance, password management, patch management, security management, security policies
    
Lumension
Published By: Lumension     Published Date: Jan 18, 2013
Adobe's code-signing infrastructure got hacked and now you have to worry about some really bad software out there that your computers will think are valid, safe applications from Adobe. One of them is pwdump which gets Windows passwords.
Tags : 
security, network security, cyber attacks, access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, business continuity, compliance, disaster recovery, encryption, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, security management
    
Lumension
Published By: Shavlik Technologies     Published Date: Apr 14, 2011
This white paper will illustrate how implementing an effective power management strategy, complete with easy-to-deploy technology, will enable an organization to reduce costs, improve security and become a greater steward of the environment.
Tags : 
shavlik, power management, security, cyberattacks, internet attacks, lan, wake-on-lan, csci, climate savers computing initiative, carbon footprint, network security, anti virus, internet security, security management, security policies, power and cooling, green computing
    
Shavlik Technologies
Published By: IBM     Published Date: Jul 19, 2012
Cyber criminals constantly look for ways to attack systems through flaws in browsers, operating systems, and other software. Software vendors patch flaws as quickly as they can. If you don't apply their patches, you're asking for trouble. Watch htis video to learn more.
Tags : 
technology, ibm, software, subscription, renew
    
IBM
Published By: CDW     Published Date: Jul 08, 2015
Addressing vulnerabilities in this growing risk environment.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, mobile, strategy, best practices, security management, security policies
    
CDW
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.