RSS feed Get our RSS feed

News by Topic

digital defense

Results 1 - 9 of 9Sort Results By: Published Date | Title | Company Name
By: SAP     Published Date: May 03, 2016
Read this white paper to explore five technology trends impacting the digital world, and find out how your organization can reimagine business models to maintain a competitive edge.
Tags : sap, digital, digital defense, competitive edge, defense industry
     SAP
By: Pega     Published Date: Apr 04, 2016
Organizations operating in the retail financial services sector – banks and insurers – need to work smart and fast to keep pace with the increasing demands of their customers. We may have a 24/7 love affair with our smartphones but it is clear that in the future we will be sharing information and making payments via fitbands, cars, TVs and white goods, as the Internet of Things fuses the physical and digital worlds. For incumbent banks and insurers, the challenge will be to leverage the possibilities of this new hyper-connected world to embed themselves in their customers’ daily lives. They need to change the way operate, which includes how they market, engage and communicate with their customer base. This will be a key defense against the growing ranks of digital newcomers seeking to disrupt and dislodge incumbents through an array of innovative and smart new offers. However, too many are moving too slowly, either from an excess of caution or complacency. This report should serve as a
Tags : 
     Pega
By: Pega     Published Date: May 24, 2016
Organizations operating in the retail financial services sector – banks and insurers – need to work smart and fast to keep pace with the increasing demands of their customers. We may have a 24/7 love affair with our smartphones but it is clear that in the future we will be sharing information and making payments via fitbands, cars, TVs and white goods, as the Internet of Things fuses the physical and digital worlds. For incumbent banks and insurers, the challenge will be to leverage the possibilities of this new hyper-connected world to embed themselves in their customers’ daily lives. They need to change the way operate, which includes how they market, engage and communicate with their customer base. This will be a key defense against the growing ranks of digital newcomers seeking to disrupt and dislodge incumbents through an array of innovative and smart new offers. However, too many are moving too slowly, either from an excess of caution or complacency. This report should serve as a
Tags : 
     Pega
By: CrowdStrike     Published Date: Feb 01, 2017
This year’s Cyber Intrusion Services Casebook focuses on in-depth digital forensics, incident response (IR) and remediation services performed on behalf of actual CrowdStrike clients. Real-life examples drawn from notable CrowdStrike Services IR engagements in 2016 — including the now-infamous hack of the Democratic National Committee (DNC) —are covered with an emphasis on best practices organizations can follow to identify and eject attackers before a devastating breach occurs. Download this report to learn: • How CrowdStrike’s Falcon OverWatch and professional services teams discovered and attributed the DNC intrusion to nation-state threat actors FANCY BEAR and COZY BEAR • The gaps in security processes and planning that your organization can address now to stop the next breach • The specific tactics, techniques and procedures (TTPs) a range of nation-state and eCrime adversaries used to penetrate their victims’ defenses, and how they attempted to cover their tracks
Tags : 
     CrowdStrike
By: SAP     Published Date: Nov 22, 2017
In today’s market, discrete manufacturers must stay focused on traditional objectives — increasing uptime and throughput in the plant and closely managing costs throughout their operations. At the same time, they must also create and offer more integrated products and services and even new business models to enhance the customer experience. These new offerings incorporate increasing amounts of technology — including Internet of Things. Indeed, by 2018, nearly one-third of industry leaders will be disrupted by competitors that are digitally-enabled. For manufacturers, this IDC white paper examines the current and future Internet of Things (IoT) imperative for the following discrete manufacturing industries: automotive, aerospace and defense, high tech, and industrial machinery. We highlight IoT-enabled scenarios — those possible both now and in an Industry 4.0 future with smart manufacturing.
Tags : market, traditional objectives, uptime, plant, managing, costs, operations, offerings
     SAP
By: FireEye     Published Date: Mar 05, 2014
If information is the lifeblood of today's digital economy, data centers are the heart. These mini-metropolises of silicon, metal, and cable are as essential to modern business as steel, motors, and coal were to the last great industrial revolution. In addition to their vital role in most business processes, data centers are the building blocks of emerging trends such as Big Data, global collaboration, and even bring-your-own-device (BYOD). The white paper describes: The widening gap between the offensive capabilities of today's cyber attackers and the weak traditional defenses deployed in most data centers; How organizations can better protect data centers.
Tags : fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
     FireEye
By: IBM     Published Date: Aug 06, 2014
With disastrous data breaches in the headlines, retail executives need to re-think the dangers of their digital environment. What are the best ways to protect the business? Keeping ahead of attackers will require a combination of systems defense, analytics and the ability to react quickly
Tags : ibm, retail, data, security, digital, defense, analytics
     IBM
By: IBM     Published Date: Oct 26, 2017
Threats to your digital assets are everywhere. They’re constant. So you build defenses to keep them out. But like a carpenter framing a new addition to a house, you want to regularly step back from working on the details for a full view of your work. Do the enterprise security measures you’ve built do a complete job of protecting against intrusions? Or have you left any gaps that allow bad actors an easy way in? When you check all the possibilities, you might be surprised.
Tags : data protection, sensitive data, data security, identity governance, digital assets
     IBM
By: Darktrace     Published Date: Jun 21, 2019
Cyber-attacks targeting technology and telecommunications firms represent the most significant threat to their sensitive customer data and invaluable intellectual property. When successful, such attacks cost these firms dearly, not only in terms of immediate loss of revenue but also in the form of subsequent reputational damage. Technology firms that provide digital services or house vast quantities of user information are particularly at risk, as demonstrated in the Uber breach that exposed the personal information of more than 25 million users. Regulations around personal data, such as GDPR, increasingly require technology firms to adopt a robust cyber defense strategy that can detect cyber-threats at an early stage. Cyber-attacks aimed at technology firms with lucrative IP have also become a fact of life in the Information Age. Often perpetrated by nation-state actors with advanced capabilities, these attacks are now remarkably subtle and stealthy, with some of the latest examples b
Tags : 
     Darktrace
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics