security consequences

Results 1 - 4 of 4Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Nov 10, 2017
Ponemon Institute surveyed 569 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. According to respondents, these attacks cause costly application downtime, loss of customers, and involvement of IT security that can result in a cost of millions of dollars. The survey highlights the challenges in identifying who is accessing their websites using stolen credentials, as well as the difficulty in preventing and remediating these attacks.
Tags : 
poneman, credential stuffing, it security, damage mitigation, research report
    
Akamai Technologies
Published By: Trend Micro     Published Date: Feb 01, 2013
Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a point solution but rather a combination of technologies and core competencies. Detecting and responding to advanced threats should involve tight integration of multiple security technologies, network analysis and visibility (NAV) tools, the ability to automatically generate content such as security rules and signatures, context on attacker history, and overall customization and flexibility to ensure that the solution is fine-tuned for your specific IT environment.
Tags : 
security, advance threat detection, nav
    
Trend Micro
Published By: GeoTrust     Published Date: Oct 06, 2014
"The business and security benefits of GeoTrust Enterprise Security Center IT departments face a range of issues—some obvious, some more subtle—when dealing with SSL certificates. These issues can have serious business and security consequences. GeoTrust Enterprise Security Center was designed with customer input to address these problems."
Tags : 
security center, it departments, ssl certificates, security consequences, customer input, manage, ssl
    
GeoTrust
Published By: Symantec     Published Date: Dec 28, 2015
Learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, as well as allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.
Tags : 
code signing, wireless networks, transferring code, content distribution, security
    
Symantec
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.