security attacks

Results 126 - 150 of 493Sort Results By: Published Date | Title | Company Name
Published By: Arbor     Published Date: Sep 15, 2014
In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors. Despite years of investment in multiple layers of security defenses, every organization is still wide open to targeted attacks. It is practically impossible to stop all possible attacks. Even next-generation firewalls, complete alerting and logging collected in a SIEM, and universal patch management and vulnerability discovery has proven to be ineffective against threat actors who are motivated, skilled and determined. This paper answers the critical questions about security analytics and explains why it is one of the fastest growing product categories in security.
Tags : 
cyber defenses, threat actors, it security, security analytics
    
Arbor
Published By: Mimecast     Published Date: Dec 20, 2018
Relying on outdated solutions like Symantec Email Security (formerly MessageLabs) to defend your organization from email-borne attacks may be risky. Others in this position have suffered from spear-phishing, ransomware and even impersonation attacks. To effectively defend against these advanced threats you need the latest protection techniques – something Mimecast delivers to tens of thousands of organizations already. Join us for this 30 min webinar to learn: • The damaging effects of ransomware, spear-phishing and impersonation attacks • What defensive strategies and technologies you should employ • Why your current Symantec Email Security solution may not be up to the task • How to enhance your email security and overall cyber resilience
Tags : 
email security, ransomware, spear-phishing, cyber resilience, symantec
    
Mimecast
Published By: Mimecast     Published Date: Jan 17, 2019
Two-thirds of all internally generated email sent is from employees communicating within an organization*. Yet most IT organizations only focus on inbound email when it comes to protecting against cyber-attacks. In doing so, they ignore the serious risks posed by internal and outbound emails and the actions of two at risk groups of users - the compromised and careless employee. Mimecast Internal Email Protect extends the security capabilities of Targeted Threat Protection to provide advanced inside-the-perimeter defenses. Watch this on-demand webinar where Mimecast’s Chief Trust Officer, Marc French, and Cyber Security Strategist, Bob Adams discuss: The top things to do to optimize your Targeted Threat Protection implementation and prepare for addressing the threats on the inside. The multiple ways internal email threats start, and why human error nearly always plays a role. The scale and impact of attacks that spread via internal email. How to extend your current protection with Mim
Tags : 
    
Mimecast
Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Why Cisco Umbrella is the simplest decision you can make to improve your company’s security. You have to make some serious security decisions when you’re an IT leader. That’s because both the volume and sophistication of attacks are intensifying relentlessly — and it’s clear that conventional defenses alone are no longer adequate. More effective blocking of attackers is particularly important because under-the-radar attacks are wreaking havoc on enterprises that rely on antivirus products, firewalls, and sandboxing alone. Umbrella is a proven service provider whose security services are completely nondisruptive. Download this whitepaper to find out more.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Ransomware is the fastest growing malware threat today. Utilize these security best practices and risk mitigation strategies to improve your overall security posture. Discover how to: • Reduce risk of ransomware • Get immediate protection against attacks • Prevent malware from spreading laterally To find out how to keep your business protected, we recommend Ransomware Defense For Dummies.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
The cloud — at one point it was a revolution in the workplace. Now it is simply accepted as an efficient way to get business done. Most of today’s IT security was built to protect a well-defined network infrastructure, but that is yesterday’s architecture. When users and assets move outside the network perimeter where the traditional security stack can no longer protect them, your enterprise is exposed to an entirely new set of risks. And with more apps and sensitive data living in the cloud or on mobile devices, gaps emerge that leave organizations susceptible to attacks. Read this flipbook to see how you can take your security to new heights. We'll explain the challenges driving the shift in the market and how you can take advantage of these changes and improve security for your organization.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Why Cisco Umbrella is the simplest decision you can make to improve your company’s security. You have to make some serious security decisions when you’re an IT leader. That’s because both the volume and sophistication of attacks are intensifying relentlessly — and it’s clear that conventional defenses alone are no longer adequate. More efective blocking of attackers is particularly important because under-the-radar attacks are wreaking havoc on enterprises that rely on antivirus products, frewalls, and sandboxing alone. A mere 30 minutes from now, any business can be more secure than it was before. That’s the simple reality of DNS-layer security.
Tags : 
    
Cisco Umbrella EMEA
Published By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation, incident response
    
IBM
Published By: IBM     Published Date: May 02, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : 
resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
    
IBM
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
Kaspersky Lab experts are releasing new research designed to assist you in your cyber security business decisions. “IT Security. Fighting the Silent Threat” is a global report into business attitudes and opinions on IT security.
Tags : 
it risk, risk report, it security, cyber attacks
    
Kaspersky Lab
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted to IT security, established businesses like yours are vulnerable to a wider array of attacks. To keep your organization safe, it's imperative to stay at least a few steps ahead of the bad guys. Do you know where the threats are coming from?
Tags : 
it security, cyber threats, threat detection
    
Kaspersky Lab
Published By: HP - Enterprise     Published Date: Aug 25, 2011
This white paper details how hybrid app security enables organizations to resolve critical security issues faster and cheaper than any other technology
Tags : 
"application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp, software vulnerabilities, critical application vulnerability, hp fortify, aberdeen, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, it security, alm, "application lifecycle management"
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Aug 31, 2011
New headlines provide ongoing evidence that IT Security teams are losing the battle against attackers, reinforcing the need to address the security of enterprise applications.This Analyst Insight reviews several practical steps you can take to get started now.
Tags : 
"application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp, software vulnerabilities, critical application vulnerability, hp fortify, aberdeen, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, it security, alm, "application lifecycle management"
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 22, 2011
Six Steps to Secure Your Applications Learn why application security is more critical than ever to your business. Find out more now.
Tags : 
application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify, sdlc, mobile security, on-demand solutions, software-as-a-service, saas
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 22, 2011
Seven Steps to Delivering More Secure Software With all the processes that go into making an application more secure. Where do you start? Learn more
Tags : 
application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify, sdlc, mobile security, on-demand solutions, software-as-a-service, saas
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 22, 2011
HP Fortify on Demand: The quickest, most affordable way to accurately test and score the security of your applications.
Tags : 
application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify, sdlc, mobile security, on-demand solutions, software-as-a-service, saas
    
HP - Enterprise
Published By: Blue Coat Systems     Published Date: Jun 30, 2011
This security report provides an overview of the changing ways in which people are using the Internet and the new methods cybercrime is using to target their attacks.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 07, 2011
This report examines the interactions of malware ecosystems, including user behavior, malware hosting sites and delivery networks and offers effective strategies to build better defenses.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats, application performance monitoring
    
Blue Coat Systems
Published By: OpenDNS     Published Date: Mar 31, 2015
A security strategy centered on preventing identified attacks and threats no longer provides adequate protection. New malware tactics emerge at a rate impossible for security professionals to match. Learn how to become a less appealing target and reduce the potential impact of security breaches.
Tags : 
    
OpenDNS
Published By: Vectra Networks     Published Date: Aug 03, 2015
Learn how Vectra empowers IT and security analysts with insights to stop attacks, even while they’re happening.
Tags : 
network security management, it security, intrusion prevention, security analysis, cyberattacks, cybercriminals, adaptive protection, intrusion prevention systems, ips, web security proxies, ids, advanced persistent threat, apt
    
Vectra Networks
Published By: Akamai Technologies     Published Date: Aug 22, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
forrester, wave, web, application, firewalls, akamai
    
Akamai Technologies
Published By: Secureworks     Published Date: Oct 04, 2017
The SecureWorks® Counter Threat Unit™ (CTU) research team analyzes security threats and helps organizations protect their systems. During May and June 2017, CTU™ researchers identified lessons learned and observed notable developments in threat behaviors, the global threat landscape, and security trends: • The global WCry and NotPetya campaigns reinforced the need for a layered approach to security. • Attacks used obfuscated malicious files and scripts to bypass filtering and deliver malware. • A Chinese threat group has had repeated success using compromised websites to attack targeted organizations. • Threat actors have been stealing intellectual property from Japanese enterprises.
Tags : 
    
Secureworks
Published By: Lookout     Published Date: Mar 29, 2017
Read the eBook to learn the difference between securing mobility and mobile security, why Enterprise Mobility Management/ Mobile Device Management (EMM/ MDM) solutions alone are not security, and the kinds of attacks your mobile fleet might be facing.
Tags : 
enterprise, mobile security, basics, ebook, lookout, emm, mdm
    
Lookout
Published By: Lookout     Published Date: Mar 29, 2017
When it comes to enterprise mobility, both iOS and Android suffer from major security vulnerabilities and are at risk of malicious threats and malware attacks. Read the Lookout’s review of today’s most prevalent issues, including OS, app, and jailbreak threats.
Tags : 
risks, mobile technology, enterprise, ios, android, lookout
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
In this eBook, you’ll learn about the difference between securing mobility and mobile security, why EMM/MDM solutions alone aren’t security, and the kinds of attacks your mobile fleet might be facing.
Tags : 
mobile security, device security, device attacks, enterprise mobile security
    
Lookout
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.