RSS feed Get our RSS feed

News by Topic

breaches

Results 301 - 325 of 416Sort Results By: Published Date | Title | Company Name
By: DataMotion     Published Date: Oct 01, 2008
After years of transferring many business activities online to take advantage of the benefits of the Internet, companies have now spent billions of dollars on antivirus software and other security measures. High-profile outbreaks and breaches reported in the international media have helped drive them to implement security measures that protect their customers and their brands while still growing their businesses...Download this paper to read more.
Tags : certifiedmail technology, email security, message security, encryption, security
     DataMotion
By: SPAN Systems     Published Date: Aug 30, 2013
2013 was a challenging year for major companies fighting high-profile security breaches. Apple, Twitter, Facebook, Microsoft, Tumblr, Burger King, Jeep, Evernote and The New York Times are just a few of the big-name organizations that had to combat security problems.
Tags : securing applications, compliance, security, applications, security, firewall, compliance issues, loopeholes
     SPAN Systems
By: HP     Published Date: Jul 29, 2008
The data residing on your storage systems and media, data-at-rest, presents serious security concerns. Regulations and various mandates around the world are putting the burden on companies and government entities to protect the private information they store. Increasingly, companies are being required to publicly disclose breaches that put individuals private data at risk, be it a customer, employee, shareholder, partner, or other stakeholder.
Tags : data security, database security, securing data, customer data, consumer data, pci, cardholder data, mission critical
     HP
By: Infoblox     Published Date: Jun 18, 2015
This in-depth white paper from the SANS institute will bring you up to speed on todayís most dangerous vulnerability. In it, you will learn about: ē How DNS works, and why, if unprotected, it can put your network at risk ē The different kinds of DNS attacksóand whoís been hit by them ē Major compliance frameworks that address the problem ē Effective governance and best practices
Tags : infoblox, dns, attacks, effective governance, sans institute, compliance frameworks
     Infoblox
By: bitglass     Published Date: Aug 19, 2014
In this Gigaom Research Webinar, we will separate the real threats from the hype, identify the most common forms of security breaches, and discuss the tools and processes businesses can put in place to minimize exposure and damage.
Tags : bitglass, saas, saas security, crm, microsoft, salesforce, identity theft, security breach
     bitglass
By: Palo Alto Networks     Published Date: Sep 30, 2016
There are no flawless software systems or applications. When flaws result in security vulnerabilities, threat actors exploit them to compromise those systems and applications and, by extension, the endpoints on which they reside. Although software vendors issue vulnerability patches to remediate those flaws, many organizations do not apply all available patches to their production environments.
Tags : palo alto, systems, software, security
     Palo Alto Networks
By: Symantec Corporation     Published Date: Feb 25, 2014
The efficacy of code signing as an authentication mechanism for software depends on the secure storage of code signing private keys used by software publishers. Companies that are diligent and willing to invest in the appropriate security measures can make the compromise of their private keys highly unlikely. This white paper describes recent security breaches and why they may have happened, along with best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates.
Tags : symantec, stuxnet, cyber-attack, security, certificate authority
     Symantec Corporation
By: Symantec Corporation     Published Date: Jun 24, 2014
The efficacy of code signing as an authentication mechanism for software depends on the secure storage of code signing private keys used by software publishers. Companies that are diligent and willing to invest in the appropriate security measures can make the compromise of their private keys highly unlikely. This white paper describes recent security breaches and why they may have happened, along with best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates.
Tags : security, code signing, software, private keys
     Symantec Corporation
By: IBM     Published Date: Nov 19, 2014
As the use of mobile devices exponentially expands, so too does security threats to the increasing number of mobile applications that companies rely on. As a result, companies struggle to keep pace with mobile application security and face the risk of embarrassing and costly data breaches. In this technical session, youíll learn how Worklight Application Scanning helps you deliver applications that arenít susceptible to the most common types of malware, including SQL Injection and Cross-Site Scripting. In addition, youíll learn how this powerful tool helps address the OWASP Top 10 Mobile Risks for 2014.
Tags : application screening, user feedback, mobile app development, cloud-based services
     IBM
By: NETIQ     Published Date: Mar 12, 2013
NetIQís Identity, Access and Security Management solutions integrate seamlessly to help you control access to cloud services and data, reduce your risk of data breaches in mixed environments.
Tags : security and compliance in the cloud
     NETIQ
By: Symantec     Published Date: Nov 12, 2015
By reading this whitepaper, you will gain insight into the following topics: The next steps in automated monitoring How automation can speed detection of attack attempts The role of automation as a key feature of the "20 security controls" or CSCs Practical guidelines for moving from manual to automated analysis
Tags : security automation, security breaches, automated monitoring, detect attack attempts, automated analysis, security
     Symantec
By: GFI     Published Date: Jun 03, 2009
More than ever, SMBs need to focus on security as part of their IT infrastructure, building around it rather than considering it as an afterthought. This has become even more critical over the past few years as many businesses have unwittingly lost their customers’ personal data due to security breaches, and as states and countries have responded by enacting laws to force the businesses to implement additional levels of protection.
Tags : gfi, smbs, small, medium, business, it infrastructure, security, windows nt
     GFI
By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. Itís not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents
     OpenText
By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. Itís not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents
     OpenText
By: CDW     Published Date: Nov 13, 2012
With the right SaaS security solutions, small businesses can gain enterprise-class safeguards at an affordable price.
Tags : cdw, cloud, cloud computing, cloud based security, cybertheft, data breaches
     CDW
By: Brainloop     Published Date: Nov 09, 2011
Business users are a key part of a company\'s security, and even the most conscientious employees can introduce serious breaches of security policy. IT can do everything in its power to secure the company\'s confidential documents--provide first-class security infrastructure, develop reasonable security policies and engage in extensive communication and training--yet still people fail to comply. The solution is to provide security that helps people do their jobs more efficiently, thereby inducing users to follow best security practices without even knowing it.
Tags : brainloop, technology, security, user compliance, indentity management
     Brainloop
By: Akamai Technologies     Published Date: Aug 30, 2019
Security is the foundation of digital business innovation. Itís a bold claim; one that hasnít always been accepted as truth. In the not so distant past, digital security was seen as a cost center. Those days are gone. Security is essential to the success of any digital business. If there is one thing you can always count on, however, itís that security-related incursions are inevitable. And itís news to no one to say that these disruptions can have dire consequences beyond downtime. Security breaches erode trust and damage reputation.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Sep 04, 2019
Itís a bold claim; one that hasnít always been accepted as truth. In the not so distant past, digital security was seen as a cost center. Those days are gone. Security is essential to the success of any digital business. If there is one thing you can always count on, however, itís that security-related incursions are inevitable. And itís news to no one to say that these disruptions can have dire consequences beyond downtime. Security breaches erode trust and damage reputation. Simply put, thereís no longer a choice. As a CIO, CISO, or other security or IT leader, you know itís your job to be the central agent stressing the connections between business and digital risk. Itís your responsibility to find the talent and technology to ensure the protection of your digital assets. According to Gartner, by 2020, 100% of large enterprises will be asked to report on their cybersecurity and technology risks to their boards of directors at least annually. Thatís up from 40% in 2018. Whether youír
Tags : 
     Akamai Technologies
By: McAfee     Published Date: Apr 25, 2014
While enterprises appear to be aware of advanced malware and its security challenges, the measures to defend against it need some attention and investment. This report presents survey results that gauge enterprise awareness of advanced malware and what measures are being taken to defend against it.
Tags : advanced malware, protection, network breaches, intrusion provention systems (ips), web and email gateway protection, tracking malware, malware analysis and detection, blocking and remediating malware
     McAfee
By: Netwrix     Published Date: Apr 22, 2008
Password practices that improve security are by their nature burdensome to the user, resulting in passwords difficult to remember which are often changed about the same time they have finally become memorized. Yet password security remains a cornerstone of system security: as much as 80% of security breaches take place not through arcane hacking and virus attacks, but through system infiltration facilitated by use of a password.
Tags : netwrix, authentication, passwords, password management, identity theft, fraud, login
     Netwrix
By: Okta     Published Date: Apr 29, 2015
2014 was a banner year for security breaches. According to the Identity and Theft Research Center, there were 783 reported U.S. data breaches, a 27.5% increase from 2013. Keeping your company and customer data safe is no longer just an IT problem; it's a top concern for C-level executives as well. Your company's reputation and bottom line depend on keeping corporate data secure ó yet employee mobility is making this a huge challenge. Read this eGuide to learn how to avoid these challenges with simpler, smarter authentication.
Tags : theft, research center, c-level, okta, theft research, security
     Okta
By: HP - Enterprise     Published Date: Nov 19, 2008
While investments to secure the enterprise continue to rise, breaches into company systems and data are skyrocketing. These cyber crimes are consistently debilitating organizations operations, reputations and ultimately, viability. Today’s CEOs are demanding aggressive strategies to protect their business. CIOs and CSOs are working together to employ proven Business Software Assurance approaches across the enterprise to stay ahead of constant threats.
Tags : business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
     HP - Enterprise
By: McAfee     Published Date: Dec 04, 2014
The attacks continue. The breaches occur. Penalties are assessed. While most universities manage to keep pace with the latest digital trends, they have been far less timely when it comes defending their networks and sensitive data against the latest targeted attacks and threats. This lack of protection is evident as recent headlines expose costly data breaches of student records and research, state and federal compliance violations, and a raft of other privacy and security issues that put students, alumni, staff, and the institutions themselves at considerable risk.
Tags : mcafee, security crisis, higher education, breaches, digital trend, privacy, security issues, sensitive data
     McAfee
By: LogRhythm     Published Date: Sep 19, 2016
In this webinar Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Niemen Marcus, Sony and other breaches. By analyzing the available information about these recent data breaches, from the perspective of detection, the two have assembled an interesting list of security monitoring lessons and ideas. The list includes tips on how to eliminate double false positives, a number of generalized monitoring scenarios, as well as acknowledges the incredible power of monitoring for new executables running for the first time on your environment. If you are concerned about data breaches and you're involved in SIEM and other security monitoring, this is the webinar for you.
Tags : cyber threat, cyber risk, technology, best practices, security
     LogRhythm
By: Symantec     Published Date: Jan 10, 2013
Advances in attacks on network security over the last few years have led to many high-profile compromises of the enterprise networks and breaches of data security. Read on to learn more about how you can prevent spoofing server to server.
Tags : spoofing, communications, how to prevent, s2s, preventing spoofing, new attacks, security threats, symantec
     Symantec
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics