Skip to main content
 

cybersecurity

Results 101 - 125 of 271Sort Results By: Published Date | Title | Company Name
Published By: Schneider Electric     Published Date: Nov 21, 2017
Measure, empower and improve your continuous improvement process in your gas plant and maximize operational profitability.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, natural gas, natural gas plant
    
Schneider Electric
Published By: Oracle     Published Date: Feb 09, 2017
For hotel executives in the midst of, arguably, the most disruptive transformation of their industry, there is a litany of reasons: Global competition. Intense cost-control pressures. Cybersecurity threats. Social media challenges. Relentless IT updates.
Tags : 
    
Oracle
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
Internally developed software applications support the most sensitive and strategically important business processes of most enterprises. Yet application security is one of the most neglected fields of cybersecurity.
Tags : 
risk-based application security, security management, application security, software applications
    
Group M_IBM Q1'18
Published By: Damballa     Published Date: Nov 13, 2012
Frost & Sullivan is proud to present the 2011 North American New Product Innovation Award in Cyber Threat Protection to Damballa Inc.
Tags : 
advanced threats, apt, advanced persistent threats, targeted attacks, advanced malware, command-and-control, c&c, dropper, call-back, virtual analysis, zero-day threats, tdl4, stuxnet, spyeye, zeus, malware detection, cyber attacks, cybersecurity, cyber threats, cyber espionage
    
Damballa
Published By: Vectra Networks     Published Date: Aug 03, 2015
Learn how Vectra protects Tri-State’s corporate and subscriber data and prevents cyberattacks to the power grid.
Tags : 
utilities provider, cyberattack detection, vulnerability management, security management, it security, security solution, network breaches, false threats, real-time insights, critical infrastructure, ids, ips
    
Vectra Networks
Published By: Puppet     Published Date: May 20, 2016
This July 2015 Forrester Report explores: - Why consistent, automated DevOps processes are essential to closing vulnerabilities and limiting exposure. - Practices, such as infrastructure as code and automated provisioning, for closing holes as soon as patches are available. - How DevOps and security professionals can work together to adopt DevSecOps.
Tags : 
    
Puppet
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: Protect your data and reputation while meeting clients’ cybersecurity expectations Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing Comply with regulations and ethics codes
Tags : 
accounting, risk reduction, encryption, compliance, data security
    
Citrix ShareFile
Published By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout
Published By: Lookout     Published Date: Dec 11, 2018
"Phishing on mobile is the biggest unsolved cybersecurity problem in the enterprise today. This is because phishing is both different and more problematic on the mobile device. "
Tags : 
    
Lookout
Published By: Carbon Black     Published Date: Apr 10, 2018
For decades, the financial services industry has endured constant change and uncertainty, from the depths of a financial crisis to widespread regulation overhauls. With the advent of more advanced cybersecurity threats, the industry has responded with rapid digital transformation to remain competitive while also pushing the envelope. Today, managing and mitigating cyber-related risks not only draws government scrutiny, but increased consumer scrutiny as well, with longstanding brand reputations anchored to institutions’ ability to protect its most sensitive data. In a recent survey of Americans, financial information was considered by consumers to be their most valuable personal information, worth even more than personal or family photos and videos. For consumers, failing to protect their data is a grave violation of trust, to the point where 72% would consider leaving their current financial institution if their sensitive information was taken hostage by ransomware.1 Not only does the
Tags : 
    
Carbon Black
Published By: Carbon Black     Published Date: Nov 26, 2018
Companies are facing massive cyber security challenges – many of which are rooted in the endpoint. In fact, according to IDC, 70% of successful breaches begin at the endpoint. If you are a McAfee customer, and still have breaches in your endpoint security, then something isn’t working. Perhaps you’re struggling to prevent advanced attacks, or your security team may be burdened by maintaining overly complex policies. You and your end users may even be facing performance issues. If you are experiencing any of these challenges, then your endpoint security products may actually be creating more problems than they solve. Ask yourself these questions for a cybersecurity reality check.
Tags : 
    
Carbon Black
Published By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 42.3% of respondents in ASEAN countries saying they deal with more than 50 alerts each day. Shockingly, for 7% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in ASEAN.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents in India saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in India.
Tags : 
    
Juniper Networks
Published By: Diligent     Published Date: Aug 05, 2016
This article provides an evaluation framework for directors and senior management. Focus is on three main factors: where data is stored, the strength of “locks” that provide access, and the control of “keys” for entry.
Tags : 
cybersecurity, security management, security
    
Diligent
Published By: Forcepoint     Published Date: Apr 20, 2016
Je länger sich Angreifer in Ihren Netzwerk aufhalten, desto mehr laterale Bewegung ist möglich - und desto größer ist auch das Risiko eines Datendiebstahls. Ein realistischer Ansatz für Datensicherheit und eine Reduzierung der Verweildauer in Ihrem Netzwerk konzentriert sich weniger darauf, eine mögliche Datenkompromittierung zu vermeiden, sondern sorgt vielmehr dafür, dass Daten niemals aus Ihrem Netzwerk herausgeschleust werden können.
Tags : 
cyber security, security application, security, cybersecurity, data prevention
    
Forcepoint
Published By: Forcepoint     Published Date: Apr 20, 2016
The longer attackers remain in your network, the more lateral movement is possible and the greater the risk for data theft. Stopping the exfiltration of data, rather than focusing on stopping data breaches, is the most realistic approach to data security and reducing cyber dwell time.
Tags : 
cyber attack, security, security application, cybersecurity, cybersecurity, attack preventing, data security
    
Forcepoint
Published By: Forcepoint     Published Date: May 16, 2016
Die finanziellen und rechtlichen Konsequenzen der während des vergangenen Jahres verzeichneten öffentlichkeitswirksamen Cyber-Angriffe enthalten eine unmissverständliche Botschaft: Datenraub kann so gravierend sein, dass die Unternehmensleitung es sich nicht leisten kann, das Thema zu ignorieren. Der Bericht "Cybersicherheit und Schutz vor Datendiebstahl" bietet einen Überblick über das Thema, der ohne technisches Fachjargon auskommt. Er liefert Anhaltspunkte die jedes Mitglied eines Vorstands, Aufsichtsrats oder Direktoriums nutzen kann, um die Sicherheitsposition der eigenen Organisation auf den Prüfstand zu stellen.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks
    
Forcepoint
Published By: Forcepoint     Published Date: May 16, 2016
Les ramifications financières et juridiques des cyber-incidents hautement médiatisés de l’année dernière ont envoyé un message clair : le vol de données est trop important pour que le Conseil d’administration ne soit pas impliqué. Le rapport « Cybersécurité et prévention du vol de données » fournit une vue d'ensemble non technique que chaque Conseil d'administration peut utiliser pour évaluer les mesures de sécurité actuelles de sa société.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks
    
Forcepoint
Published By: Forcepoint     Published Date: May 16, 2016
The financial and legal ramifications of the high-profile cyber-incidents that happened in the past year send an unmistakable message: data theft is too important for a board of directors not to be involved. The “Cybersecurity and Data Theft Prevention” report provides a non-technical overview every board of directors can use to assess their organization’s security posture.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks
    
Forcepoint
Published By: KPMG     Published Date: Jul 10, 2018
The Oracle and KPMG cloud threat report 2018 provides an up-to-date review of the cybersecurity implications and challenges of rapid cloud adoption. Is your organisation prepared? Read this report to find out: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 18, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now:
Tags : 
    
KPMG
Published By: BitSight Technologies     Published Date: Feb 03, 2015
Download "Cybersecurity Is Essential for M&A Due Diligence" to learn how Security Ratings can help you examine the risk your latest target poses to your information security (and potentially your bottom line).
Tags : 
cybersecurity, security ratings, acquistion target, cybersecurity assessment, information security
    
BitSight Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.