world

Results 376 - 400 of 3121Sort Results By: Published Date | Title | Company Name
Published By: Blackberry     Published Date: Jul 12, 2019
Law firms have received two dramatic wake-up calls about the vital importance of data security in the last two years. First, there was the leak of 11.5 million documents from offshore law firm Mossack Fonseca, known as the Panama Papers, which became public in 2016.1 Then came the massive cyberattack on prominent global law firm DLA Piper in the summer of 2017.2 As we will explore, despite the industry’s aversion to media coverage of such attacks, less-visible breaches involving the legal profession are being reported worldwide in ever-increasing numbers.
Tags : 
    
Blackberry
Published By: Blackberry     Published Date: Jul 12, 2019
Technology is changing the way that businesses across industries operate. Often referred to as “digital transformation” or “digitization,” this change is rapid, and it is relentless. It touches everything in the legal profession from the completion of everyday tasks to the way information is secured and shared
Tags : 
    
Blackberry
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) seems to be on everyone’s mind. It powers natural language recognition within voice-powered assistants like Siri and Alexa, beats world-class Go players, and enables hyper-targeted e-commerce and content recommendations across the web, as we see with Amazon and Netflix. But recently, AI has begun actively expanding its footprint within the enterprise. Executives are trying to more fully comprehend what AI is and how they can use its insights into their data to better capitalize on business opportunities. This additional information can enable engaging with customers more productively and efficiently, forming an edge against the competition. Read more in our AI survey summary.
Tags : 
artificial, intelligence, enterprise
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The information security world is rich with information. From reviewing logs to analyzing malware, information is everywhere and in vast quantities, more than the workforce can cover. Artificial intelligence (AI) is a field of study that is adept at applying intelligence to vast amounts of data and deriving meaningful results. In this book, we will cover machine learning techniques in practical situations to improve your ability to thrive in a data driven world. With clustering, we will explore grouping items and identifying anomalies. With classification, we’ll cover how to train a model to distinguish between classes of inputs. In probability, we’ll answer the question “What are the odds?” and make use of the results. With deep learning, we’ll dive into the powerful biology inspired realms of AI that power some of the most effective methods in machine learning today. Learn more about AI in this eBook.
Tags : 
artificial, intelligence, enterprise
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : 
cylance, endpoint, protection, cyber, security
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Apr 15, 2019
The Cylance 2019 Threat Report represents the company’s piece of the overall cybersecurity puzzle. It details the trends observed and the insights gained, and the threats Cylance’s consulting team, research team, and customers encountered over the past year. Cylance shares this report in the hope that you will put it to good use in our collective fight against the rising tide of cyber attacks worldwide.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Apr 26, 2019
The Sydney Opera House is one of the world’s busiest performing arts centers and Australia’s number one tourist destination. Each year, it attracts more than 8.2 million visitors on site and stages more than 2,000 performances attended by over 1.5 million people. Since opening its doors in 1973, the Opera House has become the symbol of modern Australia and the country’s premier tourist destination, with an iconic national-identity value that Deloitte Access Economics has estimated at $4.6 billion. On the Opera House’s 40th anniversary, it embarked on a Decade of Renewal, a series of projects to prepare the Opera House for future generations of artists, audiences, and visitors. Because renewal isn’t just about the building and the arts; it’s also about renewing technology and systems. This enabled the Opera House to engage VMtech and BlackBerry Cylance to modernize its IT server and network infrastructure, as well as information management, privacy, and cybersecurity.
Tags : 
    
BlackBerry Cylance
Published By: BlackLine     Published Date: May 24, 2018
Digital transformation is the new boardroom buzzword. But what does this really mean for finance teams, and why does it matter? Beyond the hype, real change is underway.
Tags : 
    
BlackLine
Published By: BlackLine     Published Date: Aug 06, 2018
The biotechnology and pharmaceutical industry is among the most heavily regulated industries in the world, challenged by evolving regulations, complex compliance requirements and close regulatory scrutiny. At the same time, companies must address the market pressures of globalization, the use of predictive data analytics and digital technologies, and the industry’s ongoing consolidation. In this challenging environment, confidence in internal controls is crucial.
Tags : 
    
BlackLine
Published By: BlackLine     Published Date: Aug 06, 2018
The game is changing. Accounting teams are expected to close the books faster and more accurately than ever before, and what used to be their entire focus is now just the price of admission.
Tags : 
    
BlackLine
Published By: Blue Coat Systems     Published Date: Oct 25, 2011
The WebPulse delivers fast and effective Web 2.0 threat protection for 75 million users worldwide. Find out more about how WebPulse can protect you!
Tags : 
webpulse, defense, malware, security, protection, blue coat, insider threats, security
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
The report shows a link between greater autonomy and business performance. It also highlights the increasing alignment between IT and the business on the risks and benefits of providing greater technology choice for users. Highlighted findings include: • The fastest growing companies in the world believe that greater technology choice can increase revenue and profits by more than 35 percent • 84 percent of businesses worldwide believe that greater technology choice is crucial to driving efficiency in the future • 72 percent of businesses see security as the biggest barrier to greater technology choice
Tags : 
technology, autonomy, business
    
Blue Coat Systems
Published By: Blue Lane     Published Date: Apr 03, 2007
One of the biggest challenges mirrors a problem in the physical server world: security patching. This paper describes in greater detail the benefits and challenges of server virtualization, and offers insight into how Blue Lane customers are utilizing the PatchPoint(r) System to combat the threat of software vulnerabilities.
Tags : 
virtualization, patching, security, vmware, network security, blue lane, patchpoint, server virtualization
    
Blue Lane
Published By: BlueArc Corporation     Published Date: Apr 24, 2008
The crisis of mass power consumption in the corporate data center has come to a head. Power required to run data centers in the U.S. is estimated to be as much as that produced by five power plants in a year. Energy expenditures and requirements have doubled in the last five years, and computer disposal is the fastest growing type of waste in the world, according to top Stanford researchers and Greenpeace.
Tags : 
bluearc, green, green computing, energy, energy efficient
    
BlueArc Corporation
Published By: BlueJeans Network     Published Date: Jun 17, 2016
The concept of all centralizing all communication methodologies (presence, instant messaging, voice, video, and messaging services) within a single system, a.k.a. unified communications or UC, is not new. One of the most popular platforms is Microsoft. In fact, Microsoft has indicated that it has 110 million Skype for Business or Lync users around the world. However, many organizations have yet to fully embrace the video conferencing capabilities available within Skype for Business / Lync. Overall we view Skype for Business (SfB) video conferencing as an excellent choice for sessions involving only SfB users. However, the SfB experience is focused more on content sharing and less on live video. Download this whitepaper to learn 12 situations in which users may wish to use a different video conferencing tool. In this paper, Wainhouse also compares two options for companies seeking better video capabilities.
Tags : 
skype for business, microsoft lync, video conferencing, bluejeans, employee communications, unified communications
    
BlueJeans Network
Published By: Bluekai     Published Date: Aug 10, 2012
Publishers today live in a data-driven world. It is no longer enough to simply create content, build audiences, and sell ads.
Tags : 
data management platform, bluekai, supply-side platforms, audience engagement, audience extension, audience analytics, emerging marketing, internet marketing
    
Bluekai
Published By: BlueVolt     Published Date: May 04, 2012
It's a Dog-Eat-Company world so maximizing your partner connections is important to your organization's success. Read the Maximizing your Partner Connections: The Role of your Online Presence in Reaching Your Market white paper from BlueVolt to learn how to optimize your extended enterprise.
Tags : 
bluevolt, extended enterprise, lms, learning management system, channel, training
    
BlueVolt
Published By: Bluewater Learning     Published Date: Aug 29, 2018
The focus on employee engagement as a driver of better business results has gotten so much traction it’s spawned an entire category of solutions within the HCM universe. But if you’re a SumTotal client, you already own a tool that has incredible — but often-overlooked — potential for creating an environment in which engagement can not only flourish, but actually be sustained. It’s all about having content that strategically positions your company, is easy to find, and truly engages your employees to seek opportunities to make a difference and to grow professionally. To really shape your SumTotal LMS into the effective piece of technology you know it can be — to see it achieve the results you and your leadership team expect it to deliver — you need to be a content architect and have a great content strategy. Now you can learn the process Bluewater has developed through years of experience helping clients worldwide maximize their SumTotal LMS to drive higher engagement and better business results: • Mapping out a plan for engagement success • Understanding the negative effects when you don’t have a content strategy that makes strategic sense for your organization — on employees, leaders, LMS owners, and learning practitioners • Architecting content for engagement today — and for the road ahead • Building the framework for a rich content ecosystem where learners feel at home • Focusing on people, processes, and technology: an approach to content strategy that supports a culture of engagement It’s all about being ridiculously happy with your SumTotal LMS.
Tags : 
    
Bluewater Learning
Published By: BMC ASEAN     Published Date: Dec 18, 2018
The world runs on IT operations. When new digital experiences delight customers, innovative business models disrupt industries, and big data makes organizations smarter than ever, it’s because of your success in supporting the complex, dynamic infrastructure and apps that power them.
Tags : 
    
BMC ASEAN
Published By: BMC ASEAN     Published Date: Dec 18, 2018
The business world is entering an age of the digital “haves” and the digital “have-nots.” In fact, research firm Forrester anticipates a growing “digital crisis” in its 2018 predictions, noting that 60% of CIOs and other executives it surveyed say they’re behind in their digital transformations. Meanwhile, Forrester expects one in five CEOs will fail to act on digital initiatives and put their firms in serious jeopardy as a result. Savvy organizations are embracing cloud, the Internet of Things (IoT), artificial intelligence (AI), and other transformative technologies to solve meaningful business problems and achieve their strategic priorities. Everyone else is getting left behind. Nowhere is this fork-in-the-road moment more apparent than in how enterprise IT teams deliver and manage services, to employees and customers alike.
Tags : 
    
BMC ASEAN
Published By: BMC Control M     Published Date: Jul 16, 2009
A short time ago, Dell, like many other companies, embarked on a broad initiative to integrate and upgrade its IT services to better satisfy business needs. As part of this initiative, Dell addressed a job scheduling solution that had failed to keep pace with ITIL_ integration. In enterprises around the world, stale job scheduling software lingers for fear of the costs and risks of conversion. Learn more today!
Tags : 
bmc, ema, dell, dell smart, automation, integration, services, itil
    
BMC Control M
Published By: BMC Control M     Published Date: Jul 22, 2009
A short time ago, Dell, like many other companies, embarked on a broad initiative to integrate and upgrade its IT services to better satisfy business needs. As part of this initiative, Dell addressed a job scheduling solution that had failed to keep pace with ITIL_ integration. In enterprises around the world, stale job scheduling software lingers for fear of the costs and risks of conversion. Learn more today!
Tags : 
bmc, ema, dell, dell smart, automation, integration, services, itil
    
BMC Control M
Published By: BMC ESM     Published Date: Aug 20, 2009
IT infrastructures have become exceedingly complex, resulting in a highly interconnected network of old and new technologies. In a world where IT budgets are shrinking and mergers are common, how do you get the most value from your IT resources?
Tags : 
it costs, it resources, it infrastructure, it budget, spend management, bmc, mergers, podcast
    
BMC ESM
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.