cyber threat

Results 1 - 25 of 398Sort Results By: Published Date | Title | Company Name
Published By: Cyveillance     Published Date: Apr 10, 2015
In today’s security landscape, more vendors than ever are offering what is purported to be “threat intelligence.” Although security experts often have different definitions for this term, one thing many of them can agree on is that an intelligence-led approach to security – that is, putting threat intelligence to real-world use – is critical to protecting organizations. If the goal of an intelligence-led security strategy is to help organizations be more proactive in finding and preparing for threats to physical and digital assets, it’s crucial to define and understand exactly what threat intelligence means, and separate fact from fiction. In this whitepaper, we dispel some common myths about threat intelligence.
Tags : 
myths, cyber, threat, intelligence, fact, fiction, big data, cloud, networking, security
    
Cyveillance
Published By: Cylance     Published Date: Mar 12, 2019
Cyber attacks are increasing in frequency, sophistication, and effectiveness.1 The ongoing trend of successful attacks demonstrates that cybersecurity practices are not keeping pace with modern threats. Is your organization well-defended, or living on borrowed time? Here are ten signs to help you determine whether your endpoint protection is primed for action or ready for retirement.
Tags : 
    
Cylance
Published By: Cylance     Published Date: Mar 12, 2019
Cyber attacks are increasing in frequency, sophistication, and e ectiveness.1 The ongoing trend of successful attacks demonstrates that cybersecurity practices are not keeping pace with modern threats. Is your organization well-defended, or living on borrowed time? Here are ten signs to help you determine whether your endpoint protection is primed for action or ready for retirement.
Tags : 
    
Cylance
Published By: Palo Alto Networks     Published Date: Dec 11, 2013
The 10 Things Your Next Firewall Must Do outlines the latest capabilities that a firewall should possess and helps you learn how to choose a firewall that can safely enable your business in the ever-changing world of network security. In this free booklet, you'll find an insight and practical advice on: - Considerations for choosing your next firewall - Best practices for implementing safe application enablement policies - Essential firewall capabilities for battling modern threats
Tags : 
firewall, palo alto, security, network security, safe applications, cyber threats
    
Palo Alto Networks
Published By: Dell SecureWorks     Published Date: Sep 09, 2013
10 Tips to Help You Minimize the Duration and Impact of a Security Breach
Tags : 
dell, dell secureworks, risk consulting, cyber security, security, security breach, counter threat unit
    
Dell SecureWorks
Published By: Limelight Networks     Published Date: Feb 21, 2018
From the boardroom to the backroom, everyone is looking for ways to protect their digital content from cyber threats like DDoS attacks, unauthorized access or theft. In this white paper, we’ll discuss ten different ways to protect your digital content, ensure high availability and maintain superior quality of experience for every digital visitor.
Tags : 
    
Limelight Networks
Published By: Schneider Electric     Published Date: Jun 05, 2018
Cybersecurity threats are an unfortunate reality for industry everywhere. How do you protect your business while still embracing new technologies that enable you to grow and deliver the best possible results? Robust cybersecurity protection is a must, as well as rigorous mindset, policies, and methodologies. Download the whitepaper to learn more.
Tags : 
cybersecurity, smart control, empowered operators, optimized assets, future of automation, reliability, safety, operational profitability, ecostruxure plant, process automation
    
Schneider Electric
Published By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : 
mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments, vulnerability management, web application security
    
McAfee
Published By: ESET     Published Date: Feb 11, 2010
This document combines the thoughts of both Research teams in ESET Latin America and ESET, LLC into a single paper, proposing a comprehensive vision of how the threatscape is likely to evolve in 2010.
Tags : 
eset, cybercrime, security, threat, crimeware, botnets, malware, social engineering, antivirus
    
ESET
Published By: NETIQ     Published Date: Jun 20, 2014
CyberEdge provides insight on both the current state of cyberthreat defense and projections for the future.
Tags : 
netiq, cyberthreat, cyberedge, cyber security, cyberthreat, security
    
NETIQ
Published By: IBM     Published Date: Oct 13, 2015
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, ibm managed security services, cyber security, data, threat, malware, index, security, research
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, cyber security, threat, data, security
    
IBM
Published By: IBM     Published Date: Jan 15, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, cyber security, overview, threats, security, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, cybersecurity, cybersecurity intelligence index, security threats, security, knowledge management
    
IBM
Published By: ThreatTrack Security     Published Date: May 21, 2015
This report provides a 360 degree view of organizations' security threats, response plans, processes, and investments. More than 800 security decision makers and practitioners were surveyed in December 2014 across North America and Europe.
Tags : 
cyberthreat, security, malware, defense, it management, knowledge management, data management
    
ThreatTrack Security
Published By: Citrix Systems     Published Date: Jul 28, 2015
CyberEdge Group’s second annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.
Tags : 
    
Citrix Systems
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn how web applications and mobile devices impact IT’s ability to successfully defend against cyberthreats, and find out why SDN may be the solution.
Tags : 
citrix, cyberthreat, report, defense
    
Citrix Systems, Inc.
Published By: Citrix Systems     Published Date: Jul 28, 2015
CyberEdge Group’s second annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 28, 2015
CyberEdge Group’s second annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.
Tags : 
    
Citrix Systems
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Get an overview of the cyberthreat landscape and see key findings from the “2015 Cyberthreat Defense Report.”
Tags : 
citrix, cyberthreat, infographic, 2015 report
    
Citrix Systems, Inc.
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Take a deep dive into survey data and findings, learn about the evolution of cyberthreats, and find out how you can prepare for cyberattacks in 2015.
Tags : 
citrix, cyberthreat defense, report, 2015
    
Citrix Systems, Inc.
Published By: CrowdStrike     Published Date: Feb 01, 2017
This year’s Cyber Intrusion Services Casebook focuses on in-depth digital forensics, incident response (IR) and remediation services performed on behalf of actual CrowdStrike clients. Real-life examples drawn from notable CrowdStrike Services IR engagements in 2016 — including the now-infamous hack of the Democratic National Committee (DNC) —are covered with an emphasis on best practices organizations can follow to identify and eject attackers before a devastating breach occurs. Download this report to learn: • How CrowdStrike’s Falcon OverWatch and professional services teams discovered and attributed the DNC intrusion to nation-state threat actors FANCY BEAR and COZY BEAR • The gaps in security processes and planning that your organization can address now to stop the next breach • The specific tactics, techniques and procedures (TTPs) a range of nation-state and eCrime adversaries used to penetrate their victims’ defenses, and how they attempted to cover their tracks
Tags : 
    
CrowdStrike
Published By: IBM     Published Date: Jan 09, 2017
Reviewing a year of serious data breaches, major attacks and new vulnerabilities. The IBM X-Force 2016 Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide in 2015.
Tags : 
ibm, security, ibm x-force, cyber security intelligence index., cyber security, intelligence, enterprise applications, business technology
    
IBM
Published By: Citrix Systems     Published Date: Jul 25, 2016
Take a deep dive into survey data and findings, learn about the evolution of cyberthreats, and find out how you can prepare for cyberattacks in 2016.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 25, 2016
Get an overview of the cyberthreat landscape and see key findings from the “2016 Cyberthreat Defense Report.”
Tags : 
    
Citrix Systems
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept