Skip to main content
 

security breach

Results 226 - 250 of 403Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Aug 19, 2016
Research conducted by the Economist Intelligence Unit shows how firms can improve data security. Certain firms consistently demonstrate success in reducing breaches across all major forms of cyber-attack. 32% of companies named their top security priority as adopting a proactive data defense strategy. Discover eight steps to reduce vulnerability to cyber-attack.
Tags : 
    
Oracle
Published By: Kaspersky Lab     Published Date: Dec 12, 2014
Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task. Download Part I: Reducing Employee and Application Risks.
Tags : 
kaspersky, it security, best practice, hygiene, sensitive information, security breach, secure passwords
    
Kaspersky Lab
Published By: Kaspersky Lab     Published Date: Dec 12, 2014
Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task. Download Part II: Reducing Mobile, Web, and Social Media Risks.
Tags : 
kaspersky, it security, best practice, hygiene, sensitive information, security breach, secure passwords, mobile risks
    
Kaspersky Lab
Published By: NeoSpire Managed Hosting     Published Date: Sep 01, 2009
In today's economy, companies are trying to assess if they can afford to become PCI compliant. What many of those same companies forget to consider whether they can afford not to be compliant. Since 2007, merchants who were found to be non-compliant with PCI DSS faced fines of $5,000 to $25,000 per month from Visa. It may seem expensive for merchants to install and maintain new security measures to become PCI compliant and validated, but these costs are only a fraction of what it would cost a company to be found in non-compliance or suffer a data breach. Learn more about PCI DSS compliance and how NeoSpire Managed Hosting can help.
Tags : 
pci compliance, neospire, pci dss faced fines, datalossdb.org, heartland payments, tjx companies, breach cardholder data, hardware
    
NeoSpire Managed Hosting
Published By: NetIQ     Published Date: Jul 27, 2011
Listen in as Andras Cser, Principal Analyst at Forrester Research, speaks about trends he is seeing in the Identity & Access Management (IAM) market, and specifically about the challenges and benefits of user provisioning.
Tags : 
active directory, ad administration, netiq, compliance, active directory administration, user provisioning, reduce administrative priviledge, itpa
    
NetIQ
Published By: NetIQ     Published Date: Dec 08, 2011
"Stop the Breach before It Happens: Easy, Smart, and Powerful Security Management Solutions" presented by Garve Hays:
Tags : 
security, breach, management, security management, event, infrastructure, threat, threat detection
    
NetIQ
Published By: CenturyLink     Published Date: Nov 18, 2011
See how Payment Card Industry compliance can keep customer data safe and strengthen your business.
Tags : 
centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
    
CenturyLink
Published By: CDW     Published Date: Jul 08, 2015
Your data is at risk. The threat of data breaches has grown larger than ever before, as attackers become more numerous and sophisticated. And as data becomes more precious, the damage that can be done by a data breach has increased greatly.
Tags : 
security, data protection, dlp, data breach, vulnerability management
    
CDW
Published By: Dell SecureWorks     Published Date: Sep 09, 2013
10 Tips to Help You Minimize the Duration and Impact of a Security Breach
Tags : 
dell, dell secureworks, risk consulting, cyber security, security, security breach, counter threat unit
    
Dell SecureWorks
Published By: Dell SecureWorks     Published Date: Sep 13, 2013
Accelerating Incident Response: How Integrated Services Reduce Risk and the Impact of a Security Breach
Tags : 
dell, dell secureworks, security breach, incident response
    
Dell SecureWorks
Published By: NAVEX Global     Published Date: Nov 19, 2013
Is your organization benefiting from the full ROI of automated policy and procedure management? Policies and procedures are the building blocks of every organization. This eBook offers articles geared toward managing the policy lifecycle from drafting and validating to approving and implementing, as well as increasing security and important steps toward protecting against data breaches.
Tags : 
compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance
    
NAVEX Global
Published By: Cyveillance     Published Date: Apr 03, 2015
In this white paper, we recap notable trends and events in information security from 2014 and look forward to what information security professionals should expect in 2015. The past year was a landmark one in the information security field, with massive data breaches capturing the public’s attention, powerful bugs causing headaches for IT teams and end users, DDoS attacks breaking records, and phishing remaining a general annoyance – or worse – for all Internet users. In this whitepaper, we discuss these trends as well as key areas of concern for 2015, including: - The impact of the Internet of Things - The growing importance of threat intelligence - The increasing influence of BRICS nations - The evolution of encryption standards - The changing role of the CISO
Tags : 
information security threat, information security, protection, security breach, internet security
    
Cyveillance
Published By: Cyveillance     Published Date: Apr 06, 2015
In this white paper, we examine notable trends and events in physical security from 2014 and assess what security professionals should expect in 2015. 2014 was truly an unpredictable year in the physical security and executive protection worlds, as large scale events targeted for disruption were executed relatively smoothly, while unforeseen developments in Ukraine and the Ebola outbreak caught many off guard. Looking ahead to 2015, we predict that local issues will continue to gain global importance, threat actors and activists will find new ways to utilize social media to spread their messages, and the lines between physical and digital threats will continue to converge. We also highlight ongoing developments in France, Mexico, Ukraine, and Germany.
Tags : 
information security threat, information security, protection, security breach, internet security
    
Cyveillance
Published By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. It’s not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : 
opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents
    
OpenText
Published By: Singlehop     Published Date: Oct 01, 2014
DDoS Survival Handbook: The Ultimate Guide to Everything You Need to Know About DDoS Attacks.
Tags : 
ddos attacks, it security, data breaches
    
Singlehop
Published By: ThreatTrack Security     Published Date: May 21, 2015
Watch this webinar to learn how to win the battle against Advanced Persistent Threats.
Tags : 
persistent threats, cyberattacks, security, data breach
    
ThreatTrack Security
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : 
cloud, date security, cloud security, virtualization, security
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Organizations around the world are embracing the economic and operational benefits of cloud computing. Whether organizations are extending internal resources or fully deploying on Microsoft Azure, the ability to take advantage of the business benefits of cloud require that organizations continue to meet key security requirements. Azure delivers a trusted cloud infrastructure on which customers can design, build and manage their own cloud applications and infrastructure. While Azure provides security controls for the infrastructure and change to virtualization layers, deploying organizations are responsible for deploying and maintaining security for the guest operating systems, applications, and data in order to protect against malware attacks, zero-day vulnerabilities and data breaches. Read this white paper to lean more about Trend Micro Instant-On Cloud Security for Microsoft Azure.
Tags : 
cloud security, microsoft azure, cloud computing, cloud infrastructure, malware attacks, data breaches, trend micro
    
CDW-Trend Micro
Published By: Flexera     Published Date: Apr 17, 2019
This white paper can help you close the gaps that can expose your organization to security breaches.
Tags : 
    
Flexera
Published By: LogRhythm     Published Date: Apr 04, 2017
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance. In 2014, the cost of malware attacks and resulting breaches was estimated at $491 billion. And these costs include more than just the money spent trying to directly respond to security breaches. Productivity, long-term profitability, and brand reputation are often severely impacted as well.
Tags : 
    
LogRhythm
Published By: CrowdStrike     Published Date: May 10, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: • How to collect and preserve data after a breach so that critical forensic information can be retrieved • What sort of in
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: May 10, 2018
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the proverbial “needle in the haystack” – the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. In this context, detecting attacks is often difficult, and sometimes impossible. This white paper describes how CrowdStrike solved this challenge by building its own graph data model – the CrowdStrike Threat Graph? – to collect and analyze extremely large volumes of security-related data, and ultimately, to stop breaches. This revolutionary approach applies massive graph-based technologies, similar to the ones developed by Facebook and Google, to detect k
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Jun 06, 2018
Who Needs Malware? How Adversaries Use Fileless Attacks to Evade Your Security Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it. One advanced threat technique that is experiencing success is the use of fileless attacks, where noexecutable file is written to disk. The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: How to collect and preserve data after a breach so that critical forensic information can be retrieved What sort of int
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
Learn how cyber threat intelligence (CTI) helps you bolster defenses, hunt down adversaries, investigate incidents and make better security decisions. While once considered a “nice to have”, Cyber Threat Intelligence (CTI) is now widely considered an essential weapon against breaches. A recent study by Enterprise Strategy Group (ESG) found that 72 percent of organizations plan to increase CTI spending — further validation of its important role in your security strategy. Yet, because threat intelligence comes in many shapes and forms, it is often misunderstood. This white paper, “Threat Intelligence: Cybersecurity’s Best Kept Secret,” offers in-depth coverage of CTI, including the different categories of threat intelligence and use cases that demonstrate CTI’s effectiveness in thwarting today’s most dangerous and sophisticated attackers. You’ll also learn how the right CTI can empower better security and executive decisions, while dramatically improving your organization's security post
Tags : 
    
CrowdStrike
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.