Skip to main content
 

attacks

Results 376 - 400 of 946Sort Results By: Published Date | Title | Company Name
Published By: FireEye     Published Date: Mar 05, 2014
Cyber attacks are growing more sophisticated and, more often than not, target small and midsize businesses (SMBs). One unlucky click - a malicious email attachment, a link to a legitimate but compromised website - could result in a costly data breach that drains your bank account and customer trust. This paper explains targeted attacks and examines reasons cyber attackers are aiming at small and midsize businesses, including: Value of your data; Low risk and high returns for criminals; Why SMBs are easier targets.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
Whether they work for an up-and-coming startup or an industry giant, security response teams are under siege as never before. Today's cyber attacks are sophisticated, relentless, and devastating, costing U.S. businesses $8.9 million a year each on average. Attacking in multiple stages across multiple vectors, advanced persistent threats (APTs) and other sophisticated attacks easily evade signature-based detection and other traditional defenses. Thiswhite paper describes: The 10 most common mistakes, strategic and technical, that incident response teams make; The effect of these mistakes and how to avoid them with a well-defined incident response plan.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
Today's cyber attacks have changed radically from just a few years ago. No longer are they the sole province of opportunistic crooks, online vandals and digitial ""hacktivists."" Today, advanced cyber attacks are the weapon of choice for organized criminal enterprises and nation-states. This white paper highlights: Why organizations need much more than fundamental security tools; Strategies for dealing with advanced targeted attacks.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
If information is the lifeblood of today's digital economy, data centers are the heart. These mini-metropolises of silicon, metal, and cable are as essential to modern business as steel, motors, and coal were to the last great industrial revolution. In addition to their vital role in most business processes, data centers are the building blocks of emerging trends such as Big Data, global collaboration, and even bring-your-own-device (BYOD). The white paper describes: The widening gap between the offensive capabilities of today's cyber attackers and the weak traditional defenses deployed in most data centers; How organizations can better protect data centers.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
From sophisticated new forms of malware to nation-state sponsored attacks and the advanced persistent threat, cybersecurity incidents have evolved at a rapid pace and are taking down entire networks, successfully stealing sensitive data and costing organizations millions to remediate. In this white paper this report, you'll receive a comprehensive overview of survey results and expert analysis on: The top security threats for global organizations in 2013; The largest gaps in organization's detection and response to threats; How these gaps will be filled in the coming year - new staff, tools or services; What organizations must do to stay ahead of these advanced threats.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: AlienVault     Published Date: Aug 14, 2015
Attackers are becoming increasingly skilled at planting malicious code on websites. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.
Tags : 
    
AlienVault
Published By: Infoblox     Published Date: Sep 09, 2014
Stories about devastating cyberattacks are plaguing the news. Why? The DNS protocol is easy to exploit. See your network the way hackers do—as an easy target. Learn how you can effectively secure your DNS infrastructure today.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox
Published By: Infoblox     Published Date: Sep 09, 2014
DNS is a key part of enterprise networks but increasingly targeted by hackers. Traditional security measures such as next-generation firewalls or secure web gateways won’t shield your infrastructure from attacks. Learn how to protect your DNS today.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox
Published By: Infoblox     Published Date: Sep 09, 2014
An integrated DNS architecture is needed in today’s networking landscape. Designing a secure DNS architecture requires more than increased bandwidth and QPS. Learn how to build a secure and scalable DNS solution to ensure network availability.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox
Published By: Infoblox     Published Date: Jun 18, 2015
Download this white paper and find out how you can turn your biggest vulnerability into a key layer of your network security defense.
Tags : 
infoblox, network security, dns based attacks, next generation firewalls, malware attacks, dns servers, dns infrastructure, internal attacks, external attacks
    
Infoblox
Published By: Infoblox     Published Date: Jun 18, 2015
This in-depth white paper from the SANS institute will bring you up to speed on today’s most dangerous vulnerability. In it, you will learn about: • How DNS works, and why, if unprotected, it can put your network at risk • The different kinds of DNS attacks—and who’s been hit by them • Major compliance frameworks that address the problem • Effective governance and best practices
Tags : 
infoblox, dns, attacks, effective governance, sans institute, compliance frameworks
    
Infoblox
Published By: Infoblox     Published Date: Jun 18, 2015
This white paper gives you an overview of how you can secure external DNS from cyberattacks and secure internal DNS from infrastructure attacks, APTs and malware that exploit DNS, and data exfiltration via DNS.
Tags : 
infoblox, dns security, cyberattacks, apts, malware
    
Infoblox
Published By: xMatters     Published Date: Sep 22, 2014
When it comes to data breaches and service outages, it’s no longer a question of if but when. Governments worldwide increasingly have new laws, pending legislation, privacy regulations and “strong suggestions” for protecting sensitive information and taking action when breaches or service outages occur. Get the Complimentary White Paper and learn how you need to prepare for these new laws and more. The white paper examines current regional legislation and how you can implement communication best practices for maintaining transparency and trust in the face of consumer-facing service disruptions.
Tags : 
communication, best practices, data, breaches, enterprise, consumer, confidence, science, attacks, outages, transparency
    
xMatters
Published By: Great Bay Software     Published Date: Apr 12, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Waratek     Published Date: Mar 23, 2015
Waratek has developed a disruptive new approach to application security that protects applications and sensitive data from attacks like SQL Injection, zero-day and unpatched vulnerability exploits at runtime, without code changes or hardware devices.
Tags : 
application security, runtime application self protection, web application security, sql injection, zero day attack, zero day vulnerability, legacy java code, virtual patching, open source vulnerabilities, owasp, cloud security, gartner research report, threat forensics, advanced persistent threat
    
Waratek
Published By: Forrester Research     Published Date: Apr 27, 2015
Report | Recommendations for Enterprise Security in 2015
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks
    
Forrester Research
Published By: Forrester Research     Published Date: Apr 27, 2015
Download the report to learn how to prepare an Incident Response Plan that ensures your business recovers quickly and effectively.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks
    
Forrester Research
Published By: Mimecast     Published Date: Aug 30, 2016
Download Resetting Your Email Security Strategy to learn: - How employees are your first and last line of defense in attacks and why proper education is key. - How you can fix your processes against modern threats like whaling - The critical role of today’s cyber security technologies - Why your security strategy is doomed to failure without strong leadership"
Tags : 
mimecast, email, email security, cyber security, whaling, email security strategy
    
Mimecast
Published By: Mimecast     Published Date: Jan 11, 2017
Organizations that work with the personal data of European Union residents need to overhaul business processes to avoid the risks of violating the General Data Protection Regulation, which takes effect in May 2018. Penalties for non-compliance could cost your organization upwards of €20 million or 4% of total annual worldwide revenue, whichever is higher. Mimecast provides numerous ways to help simplify GDPR compliance. Learn how Mimecast Targeted Threat Protection helps ward against impersonation attacks, weaponized attachments, and malicious URLs – offering a comprehensive front-line defense for the personal data entrusted to you when it is attacked via the email vector.
Tags : 
mimecast, security, gdpr compliance, gspr risk management
    
Mimecast
Published By: Mimecast     Published Date: Feb 13, 2017
Mimecast has seen firsthand that not all email security systems perform equally well. But, until now, we’ve lacked the comparative data to prove our perceptions. In order to address this head-on, Mimecast has launched the Email Security Risk Assessment (ESRA). The Mimecast ESRA has three goals: 1. To test the Mimecast cloud security service against an individual organization’s incumbent email security system. To help the organization understand the relative efficacy of the security systems and to see the number, type and severity of email-borne threats that are currently getting into the organization. 2. To inform the security industry with hard data on the effectiveness of various commonly-deployed email security systems. 3. To inform the security industry with hard data regarding the number, type and severity of email-borne threats that are being actively used in attacks. Download Now!
Tags : 
mimecast, email. esra, email security, cloud security
    
Mimecast
Published By: Mimecast     Published Date: Feb 13, 2017
Security and risk (S&R) pros have the challenging task of using finite resources (including budget, time, and people) to protect their businesses from every possible attack type. On top of this, S&R pros don’t just need to watch out for threats coming from outside their walls, but must keep an eye on internal threats as well. S&R decision-makers face threats from three groups of insiders – compromised accounts (internal accounts that have been compromised by external attacks), careless misuse (internal policy violators and those who accidentally leak or expose data or systems), and malicious insiders (insiders who purposefully take or misuse data or exploit systems), and they must be prepared for each. In February 2017, Mimecast commissioned Forrester Consulting to evaluate the state of enterprise security readiness for internal email threats.
Tags : 
email security, internal threats, mimecast, forrester
    
Mimecast
Published By: FICO     Published Date: Mar 14, 2017
Learn how technologies such as AI, self-calibrating models and self-learning analytics are being used to detect cyber attacks before they happen. Download now!
Tags : 
network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
    
FICO
Published By: Resilient Systems, Inc.     Published Date: Nov 24, 2015
With cyber attacks growing increasingly frequent and complex, cybersecurity strategies are shifting: while prevention is still important, it is more about prevailing.
Tags : 
resilient systems, threat, cybersecurity
    
Resilient Systems, Inc.
Published By: Flexera     Published Date: Sep 08, 2016
This white paper will discuss the key elements of Software Vulnerability Management and how a properly deployed solution based on Vulnerability Intelligence will help organizations to maintain compliance and further secure their IT systems from breaches, attacks and data loss
Tags : 
    
Flexera
Published By: Avi Networks     Published Date: May 14, 2018
Avi Vantage is the only solution that delivers built-in application analytics in addition to enterprise-grade load balancing and application security. With millions of data points collected in real time, the platform delivers network-DVR like capabilities with the ability to record and display application analytics over specific time intervals (last 15 minutes, hour, day, week etc.) or for individual transactions. These application insights including total round trip time for each transaction, application health scores, errors, end user statistics, and security insights (DDoS attacks, SSL vulnerabilities, ciphers etc.) simplify troubleshooting of applications.
Tags : 
    
Avi Networks
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.