cyber threat

Results 351 - 375 of 396Sort Results By: Published Date | Title | Company Name
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Online where the reputation and success of your business is often measured by the trust that your customers have in the security of your website, it is important to understand how you can maintain and build on that trust. To that end, SSL/TLS has been the key to trust on the Internet for more than a decade and will continue to be so when it comes to providing the highest levels of protection against evolving cyber security threats. And while, yes, the technology is sophisticated and leading edge, the goal is simple: to make the Internet safer to transact business—for you, your customers and everyone else with whom you interact online. Please use this document as a reference to understand the threat landscape and understand how you can protect your company and your infrastructure.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Over the past decade, businesses have had to adapt to an array of technical changes, including an increasingly hostile cyber environment. We saw the early precursors of cybercrime decades ago when computer use was limited to a relatively small group of specialists and electronics enthusiasts. Innovative programmers, some still in high school, would find ways to display annoying messages on their friends’ computers and from there spread to other devices via shared floppy disks.This kind of part practical joke-part vandalism form of malware has been overshadowed by the more serious, technically complex, and financially lucrative form of today’s cybercrime. In this guide, we will examine major types of threats to information security that businesses face today as well as techniques for mitigating those threats. One of the most important tools available to us is SSL technology.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Feb 25, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
mobile apps, symantec, cybercriminals, security, mobile applications, code signing, malware
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Feb 25, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
symantec, mobile, mobile applications, security, code signing certificates
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
security, mobile, mobile app, code, mobile application, code signing, software development
    
Symantec Corporation
Published By: Norse     Published Date: Oct 22, 2013
As cyberattacks and fraud continue to increase in frequency and sophistication, organizations are placing a greater emphasis on cyberthreat intelligence as a way to protect against compromise, data breach, and losses from online fraud. Measuring the true value of threat intelligence has been difficult however. For the first time the Ponemon Institute has conducted a study that reveals the facts behind the impact that weak threat intelligence is having on organizations.
Tags : 
threat, cyber security, impact report, threat intelligence, it security, cyber threat, data breach, security attacks, enterprise security, exploits, live threat, business technology
    
Norse
Published By: Norse     Published Date: Oct 24, 2013
Learn how to protect your financial institution and your customers from cyber-attacks and fraud by learning about 4 technologies that can strengthen security.
Tags : 
threat, cyber security, impact report, threat intelligence, it security, cyber threat, data breach, security attacks, enterprise security, exploits, live threat, security
    
Norse
Published By: Symantec     Published Date: Dec 04, 2014
As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years.
Tags : 
phishing, cyber crime, internet fraud, phishing schemes, hacker, fraud alert, phishing kits, security
    
Symantec
Published By: AlienVault     Published Date: Mar 30, 2016
The CIS Critical Security Controls (CSCs) provide 20 controls that organizations of any size can use to improve their security posture and reduce the risk of cyber threats to critical assets, data, and network infrastructure. The AlienVault USM platform, with its built-in essential security capabilities and integrated threat intelligence, can help organizations implement these controls quickly and effectively. This document describes how the AlienVault USM platform maps to each of the CIS CSCs.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Threat Intelligence is one of the most critical weapons we can use in cyber defense. Knowing which attackers are trying to target your organization, as well as how, why, and when gives you an advantage when trying to thwart these attacks. In today’s landscape, security researchers are a modern-day version of Sherlock Holmes. They’re constantly analyzing clues to an adversary’s motives and techniques, tracking down their ephemeral footprints amidst the chaos of our cyber community. However, these researches can also make hasty conclusions before all the facts are gathered, and dismiss the most important clues during investigations. This evaluation guide is designed to help you evaluate threat intelligence service providers, so that you can effectively put threat intelligence to work for you. You’ll learn: • The 3 characteristics to look for when evaluating threat intelligence vendors • The most important questions to ask when evaluating threat intelligence vendors and what to listen for
Tags : 
    
AlienVault
Published By: Hewlett Packard Enterprise     Published Date: Mar 29, 2017
Join this dynamic LinkedIn group to be part of the cyber-security education conversation to gain an understanding for the best practices to improve security. Learn why HP says 64% of IT managers believe their printers are infected with malware, but only 45% of those IT professionals consider printers to be a medium or high risk vulnerability. The first responsibility of IT professionals is to make sure their company’s information is secure and today any device can become an access point threat. Printers and MFPs can be the Achilles’ Heel of any cyber-security plan and are a goldmine for hackers looking to steal pertinent information. Join the conversation and learn what’s necessary to protect your company.
Tags : 
hewlett packard, printer security, information technology
    
Hewlett Packard Enterprise
Published By: PassGo     Published Date: Oct 23, 2007
Looking at IT security history, the bad guys were always far more sophisticated than the people who tried to stop them. Even if companies or the government could conceive of IT security it was almost impossible to achieve it because of the lack of knowledgeable security professionals out there and the lack of security protection tools in the marketplace.
Tags : 
risk assessment, hacker, hackers, hacker detection, cyber crime, cybercrime, cybercrimes, intrusion, intrusion prevention, intrusion detection, network security, azoogle, azoogle ads
    
PassGo
Published By: HP - Enterprise     Published Date: Oct 16, 2008
As the military and US government rely more heavily on custom-built applications for communications and management, they also become more vulnerable to cyber attacks. Worse, according to the Dept. of Homeland Security, the number of attacks on custom-built applications is doubling every year. Learn about critical threats, methods that military and civilian agencies can use to deal with cyber attacks and technologies that improve security for custom-built applications.
Tags : 
security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, department of homeland security, us government, military agency, civilian agency, military
    
HP - Enterprise
Published By: Focus     Published Date: Feb 09, 2011
Discover the primary vendor solutions and decision factors that must be considered when selecting a Unified Threat Management product to provide network defense.
Tags : 
    
Focus
Published By: Arbor Networks     Published Date: Mar 06, 2013
This Frost & Sullivan white paper identifies what organizations need to know to protect their intellectual property and prepare for unexpected data breaches.
Tags : 
cyber threats, security, ddos, data breaches, atlas, frost & sullivan, cloud, hosting, cloud computing, network
    
Arbor Networks
Published By: NETIQ     Published Date: Mar 12, 2013
File integrity monitoring facilitates the detection of attacks by cybercriminals and insider threats that may result in costly data breaches. It is a critical component of Payment Card Industry Data Security Standard (PCI DSS).
Tags : 
data security, compliance, pci dss, file integrity monitoring, fim, corporate compliance security, business technology
    
NETIQ
Published By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : 
cloud, mobility, social business, big data, external threats, business risks, business continuity, financial stability, brand reputation, protecting reputation, prevent theft, organizational defenses, global analytics, broad data, real time data, security risks, prevent risks, security, database security
    
IBM
Published By: Norse     Published Date: Apr 18, 2014
Learn about the epidemic of compromises that are taking place at healthcare organizations due to cyberattacks and see what steps your organization should take to protect against these threats.
Tags : 
health care, cyberattacks, compromised devices, norse, epidemic of compromises, protection against threats, security, it management, enterprise applications, business technology, information technology
    
Norse
Published By: Symantec     Published Date: Oct 07, 2014
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks.
Tags : 
intelligence, cyber security, threats, trends, malware, spam, business risks, security
    
Symantec
Published By: Symantec     Published Date: Oct 07, 2014
In this sophisticated threat environment,traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat environment and the acceptable risk level for the organization. This whitepaper presents best practice-based approaches recommended for minimizing cyber risk. These are arranged across five pillars and provide specific actions for each pillar to be performed by identifiable IT jobs.
Tags : 
security, threat enviornment, security posture, cyber resilient enterprise, minimize cyber risk
    
Symantec
Published By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common browser vulnerabilities used to execute attacks, what attackers do next to take control of the system, and how to catch it before the attacker moves further into your network
Tags : 
end-user protection, cyberattacks, browser vulnerabilities, security management, modern threats, threat sharing, security products, firewall, anti-virus, network intrusion detection, vulnerability management
    
AlienVault
Published By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common PCI DSS compliance challenges, questions to ask as you plan and prepare, core capabilities needed to demonstrate compliance, and how to simplify compliance with a unified approach to security
Tags : 
pci, dss, compliance, alienvault, security management, vulnerability management, cyberattacks, data breach prevention, security intelligence, behavioral monitoring, asset discovery, threat detection
    
AlienVault
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept