RSS feed Get our RSS feed

News by Topic

combating

Results 1 - 19 of 19Sort Results By: Published Date | Title | Company Name
By: FireEye     Published Date: Nov 27, 2012
Combating the Attack of Choice for Cybercriminals
Tags : cybercriminals, fireeye, phishing attacks, apt, advanced persistent threat, security
     FireEye
By: Kindred Hospital Rehabilitation Services     Published Date: Feb 22, 2019
A rehab program is only as good as its staff. Acquiring, retaining and keeping rehab talent engaged is critical for program effectiveness. Staffing issues can burden providers with additional costs and make it hard for them to deliver a consistently high quality of care, but there are key strategies to help relieve the staffing burden. The medical industry is facing a growing talent shortage. Recent estimates predict that America will be short of more than 130,000 doctors by 2025.1 Specialized departments will suffer especially high shortage rates. If healthcare providers want to minimize the impact of this shortage, they must optimize their recruitment and retention practices. This guide details the best strategies for making that happen.
Tags : 
     Kindred Hospital Rehabilitation Services
By: EMC Corporation     Published Date: May 27, 2014
RSA Technical Brief: The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions. This technical brief discusses why combating advanced threats depends on organizations shifting more security resources from prevention to detection and remediation, and developing intelligence-driven security programs.
Tags : emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
     EMC Corporation
By: BAE Systems     Published Date: Dec 29, 2015
Learn about the challenges involved in combating first-party fraud and emerging best practices
Tags : bae systems, applied intelligence, fraud, first-party fraud, financial institution, network analytics, detection, prevention
     BAE Systems
By: eFax     Published Date: Jul 05, 2012
As IT managers urgently seek to reduce the fixed costs associated with running their in-house fax servers, cloud-based faxing emerges as a highly effective tool for combating the unpredictability of fluctuating infrastructure costs.
Tags : fax server, outsource, outsourced applications, cloud, cloud-based, affordable faxing, it costs, it budget
     eFax
By: McAfee     Published Date: Jan 23, 2013
A criminal industry develops. This paper explores bot evolution, it’s global prevalence, who’s at risk, a look forward and combating bots using Global Threat Intelligence.
Tags : botnets, bots, defense in depth, threat prevention, advanced attacks, malware
     McAfee
By: McAfee     Published Date: Feb 06, 2013
Change control processes are often reactive and require manual responses, an ineffective approach to combating today’s threats and handling the growing number of devices in the IT infrastructure.
Tags : 
     McAfee
By: LogRhythm     Published Date: Aug 08, 2016
IT environments have become much more vulnerable as enterprise mobility, cloud services and “bring-your-own-everything” have broken down the defensible perimeter and added layers of complexity to securing the enterprise. At the same time, the nature of cyber threats has changed dramatically. Threat actors are well organized and well funded, and many of them are known to be supported by nation states. They have sophisticated technical skills which allow these actors to create custom malware for very specific targets, and they are relentless in pursuit of their objectives. Moreover, almost anyone with a malicious intent can purchase malware and rent botnets on the Dark Web, lowering the bar for criminal entities, nation states, and terrorists to use cyber as a weapon of choice towards their intended purpose.
Tags : security, technology, best practices, information technology, cyber threats, mobility
     LogRhythm
By: McAfee EMEA     Published Date: Nov 15, 2017
Atrius Health Chief Information Security Officer Chris Diguette oversees security for Atrius Health, the largest physician-led healthcare provider in the northeastern US. The organization is recognized nationally for its use of health information technology. Diguette is also CIO of the VNA Care Network, a home healthcare provider and subsidiary of Atrius Health. As CISO, Diguette and his team work to implement and maintain a security infrastructure that safeguards the organization’s critical health information systems and applications, such as its Epic Systems Electronic Medical Records (EMR) system and the personal data of more than 675,000 patients at 29 facilities in eastern and central Massachusetts.
Tags : artius, health, chief, information, security, officer, organization
     McAfee EMEA
By: Panda Security     Published Date: Jan 16, 2008
A new white paper from Panda Security discusses the new breed of silent online threats that can bypass traditional antivirus programs and penetrate even the most highly 'protected' networks.  Additionally, the sheer volume of malware has overwhelmed the antivirus industry as a whole. Collective Intelligence is a new global security model specifically designed to combat the next evolution of malicious code.
Tags : malware, virus, anti-virus, spyware, anti-spyware, anti-malware, bot, botnet
     Panda Security
By: Lumension     Published Date: Jan 18, 2013
In this webcast learn why Randy Franklin Smith from Ultimate Windows Security stands up for group policy as the "right" way to configure the bulk of workstation security settings.
Tags : compliance, security, policy, group policy
     Lumension
By: IBM     Published Date: Aug 07, 2012
Leading companies applying? Predictive intelligence? To proactively mitigate and manage complexity-fraught risks, while bringing value to their bottom line and their brand.
Tags : combating, combat, risk, predictive, intelligence, companies, applying, proactively
     IBM
By: Lumension     Published Date: Sep 18, 2012
Beyond Compliance: Combating Threats with Endpoint Configuration Management
Tags : suite, endpoint configuration, threats, compliance, lumension
     Lumension
By: Sunbelt     Published Date: Jan 15, 2009
Sunbelt Software’s new VIPRE Enterprise package is ideally suited to combating legacy and new blended malware threats from traditional viruses to the newest spam and Trojans. It optimizes overall system performance by incorporating antivirus and antispyware protection into a single engine that consumes minimal system resources and costs 50% to 75% less than competing products.
Tags : sunbelt software, bloatware, vipre enterprise, malware threats, traditional viruses, trojans, anti-virus, anti-spyware
     Sunbelt
By: IBM     Published Date: Jan 09, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time.
Tags : ibm, security, big fix, advanced threats, security, security intelligence, endpoint security
     IBM
By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
     AlienVault
By: Bronto     Published Date: Jan 03, 2013
While most marketers would agree that the more data we have, the better; it's important we focus on collecting the "right" data and using it sensibly to execute effective email, mobile, and social marketing campaigns.
Tags : esp, email marketing, retail, automation, automated, marketing, digital marketing, software
     Bronto
By: FireEye     Published Date: Sep 11, 2012
How to Stop Spear Phishing Attacks: Combating the Attack of Choice for Cybercriminals
Tags : fireeye, phishing, cybercrimicals, security
     FireEye
By: SAP     Published Date: May 03, 2016
Indiana's Management and Performance Hub (MPH) program has developed a comprehensive, enterprise-wide, data-driven management system to help gain insight into the drug abuse crisis. Indiana MPH staff is tackling the issue using crime lab drug data from across the state to see new correlations in drug use over time and find insight into crime.
Tags : sap, indiana, government, analytics, predictive analytics, hana, digital
     SAP
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics