RSS feed Get our RSS feed

News by Topic

cybercrime

Results 1 - 25 of 127Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Apr 20, 2017
Cybercrime is more sophisticated and dangerous than ever before, and the scope of newly emerging threats is unprecedented. At the same time, the growing number and diversity of endpoints in the enterprise is expanding the network edge to the point of disappearing. Both these trends will continue with ongoing bring your-own-device (BYOD) initiatives and explode with the emerging Internet of Things (IoT).
Tags : cyber crime, security compromise, software management, information security, it management
     IBM
By: Cisco     Published Date: Jul 08, 2016
Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major disruptions to organizations and the national infrastructure. Not only are these advanced attacks difficult to detect, but they also remain in networks for long periods of time and amass network resources to launch attacks elsewhere. Traditional defenses that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum—before, during, and after an attack.
Tags : 
     Cisco
By: Delphix     Published Date: May 03, 2016
Data security is a top concern these days. In a world of privacy regulation, intellectual property theft, and cybercrime, ensuring data security and protecting sensitive enterprise data is crucial. Only a data masking solution can secure vital data and enable outsourcing, third-party analysis, and cloud deployments. But more often than not, masking projects fail. Some of the best data masking tools bottleneck processes and once masked, data is hard to move and manage across the application development lifecycle.
Tags : 
     Delphix
By: CA Technologies     Published Date: Aug 26, 2016
Thanks to numerous, headline-making incidents in recent years, cybercrime has risen toward the top of the concern list for many organizations—and the customers with whom they do business.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
     CA Technologies
By: Juniper Networks     Published Date: Oct 19, 2015
New Juniper Networks-sponsored research, by the RAND Corporation, “The Defender’s Dilemma: Charting a Course Toward Cybersecurity,” introduces a first-of-its-kind heuristic model that helps companies map the economic drivers and challenges of defense.
Tags : juniper, rand, cybercrime, cybersecurity, threat, malware, security
     Juniper Networks
By: Juniper Networks     Published Date: Oct 20, 2015
RAND reports present research findings and objective analysis that address the challenges facing the public and private sectors.
Tags : juniper, cybercrime, data, narkets, research, analysis, security
     Juniper Networks
By: IBM     Published Date: Apr 24, 2017
Cybercrime is more sophisticated and dangerous than ever before, and the scope of newly emerging threats is unprecedented. At the same time, the growing number and diversity of endpoints in the enterprise is expanding the network edge to the point of disappearing. Both these trends will continue with ongoing bring your-own-device (BYOD) initiatives and explode with the emerging Internet of Things (IoT).
Tags : cyber crime, security compromise, software management, information security, it management
     IBM
By: IBM     Published Date: May 26, 2017
A significant challenge for many organizations has been enabling their analysts to find the "unknown unknown." Whether that unknown is malware lurking within the enterprise or within slight variations in fraudulent transactions, the result has been the same: enterprises continue to fall victim to cybercrime. IBM is addressing this challenge with IBM i2 Enterprise Insight Analysis. By pairing multi-dimensional visual analysis capabilities with powerful analytics tools, IBM is giving the analyst team an effective early-detection, cyberintelligence weapon for its arsenal.
Tags : security. ibm, ibm i2, cyber-intelligence, fraud, malware
     IBM
By: Blue Coat Systems     Published Date: Jun 30, 2011
This security report provides an overview of the changing ways in which people are using the Internet and the new methods cybercrime is using to target their attacks.
Tags : blue coat, wan optimization, secure web gateway, application performance monitoring
     Blue Coat Systems
By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
     Symantec
By: Symantec     Published Date: Jul 30, 2014
A survival guide by Symantec to help beat cybercrime.
Tags : cybercrime, survival guide, beating cybercrime, symantec guide, security
     Symantec
By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
     Symantec
By: Symantec     Published Date: Jul 30, 2014
A survival guide by Symantec to help beat cybercrime.
Tags : security
     Symantec
By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
     Symantec
By: Symantec     Published Date: Jul 30, 2014
A survival guide by Symantec to help beat cybercrime.
Tags : cybercrime, survival guide, beating cybercrime, symantec guide, security
     Symantec
By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
     Symantec
By: Symantec     Published Date: Jul 30, 2014
A survival guide by Symantec to help beat cybercrime.
Tags : cybercrime, survival guide, beating cybercrime, symantec guide, security
     Symantec
By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
     Symantec
By: Symantec     Published Date: Jul 30, 2014
A survival guide by Symantec to help beat cybercrime.
Tags : cybercrime, survival guide, beating cybercrime, symantec guide, security
     Symantec
By: Symantec     Published Date: Jul 30, 2014
A survival guide by Symantec to help beat cybercrime.
Tags : cybercrime, survival guide, beating cybercrime, symantec guide, security
     Symantec
By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
     Symantec
By: FireEye     Published Date: Mar 20, 2013
Winning the War Against the New Breed of Cyber Attack.
Tags : fireeye, threat protection, cyber attacks, cybercrime
     FireEye
By: Delphix     Published Date: May 28, 2015
In a world of privacy regulation, intellectual property theft, and cybercrime, only a masking solution can secure vital data and enable outsourcing, third party analysis, and cloud deployments. Delphix delivers rapid deployment of masked data in minutes, service-based masking of production systems, and the ability to ship masked data across sites, to third parties, and into the cloud, with minimal network footprint.
Tags : 
     Delphix
By: ESET     Published Date: Sep 07, 2011
In this report, we investigate the implementation details of the malware and the ways in which it is distributed, and consider the cybercriminals' objectives.
Tags : eset, tdl, x64, cybercriminal, cybercrime, malware, security, rootkit
     ESET
Start   Previous   1 2 3 4 5 6    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics