RSS feed Get our RSS feed

News by Topic

hygiene

Results 1 - 19 of 19Sort Results By: Published Date | Title | Company Name
By: Tenable     Published Date: Aug 15, 2018
"What’s your vulnerability assessment style? Are you scanning weekly, monthly or quarterly? And, what does your scanning habit reveal about the maturity of your organization’s vulnerability assessment practices, a critical part of cyber hygiene? These are the key questions Tenable Research set out to answer in our Cyber Defender Strategies Report. We discovered four common vulnerability assessment strategies in use today. These strategies tell us how mature an organization’s vulnerability discovery process is – and help us identify ways to improve. Download the report now to: - Learn what the four vulnerability assessment styles tell us about cyber risk maturity. - Compare your vulnerability assessment strategy to these four common scanning styles. - Find out what steps you can take today to improve your vulnerability assessment strategy – no matter where you are on the maturity scale."
Tags : cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
     Tenable
By: Illusive Networks     Published Date: Apr 10, 2019
Attack Surface Manager (ASM) gives security teams unprecedented power to easily implement a cyber hygiene program to harden their networks against malicious lateral movement of cyberattackers. This paper provides an overview of common ways that Illusive's customers are using Attack Surface Manager, including fortifying PAM/PIM solutions, detecting insider threats and malicious insider activity, and providing powerful, automated Red Team functions.
Tags : attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security
     Illusive Networks
By: Illusive Networks     Published Date: Apr 10, 2019
Do you know how attackers can move once they’re inside your network? The access footprint changes constantly as users log on and off, restart systems, change roles, and access resources. Until now, these conditions have only been visible when skilled analysts inspect individual systems. Attack Surface Manager reveals hidden credentials and paths to critical systems so you can continuously impede attacker movement—without impeding the business.
Tags : attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security
     Illusive Networks
By: Qualys     Published Date: Feb 17, 2016
It’s not easy being today’s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises has increased dramatically, while IT budgets have shrunk and skilled cyber security talent is virtually impossible to find. Thankfully, the CIS Top 20 Critical Controls provides a pragmatic approach, offering prioritized guidance on the important steps for implementing basic cyber hygiene practices. With the CIS Top 20 Critical Security Controls, CISOs now have a blueprint for reducing risk and managing compliance. By automating each of these controls, CISOs enable their information security teams to do much more with less, essentially operationalizing good cyber hygiene.
Tags : qualys, cis, critical security, cloud computing, cyber security, security
     Qualys
By: Marketo     Published Date: Jun 08, 2017
Unfortunately, we’ve all been there. Every now and then, we make cringe-worthy mistakes. But the mistakes that haunt us in our personal lives often aren’t as public as email marketing mistakes, which go out to hundreds and thousands of subscribers. Download this ebook to learn about the eight most common email marketing pitfalls and how you can avoid or fix them: Mistake 1: Unclear subject lines Mistake 2: Poor email list hygiene Mistake 3: Failure to measure email inboxing Mistake 4: No engagement segmentation Mistake 5: No re-engagement strategy Mistake 6: Using image-based CTA buttons Mistake 7: No mobile optimization Mistake 8: Bad testing decisions
Tags : continuously opened emails, engagement, unique clicks, multiple clicks, cleaning campaign, sender reputation, marketo, marketing
     Marketo
By: Trillium Software     Published Date: May 19, 2011
By implementing the six pillars of data quality optimization, your organization can incrementally improve the quality of the data that drives all your operations.
Tags : trillium software, data quality management, iqm, information quality management, quality maturity model, enterprise data management, edm, data storage requirements
     Trillium Software
By: Kaspersky Lab     Published Date: Dec 12, 2014
Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task. Download Part I: Reducing Employee and Application Risks.
Tags : kaspersky, it security, best practice, hygiene, sensitive information, security breach, secure passwords, security
     Kaspersky Lab
By: Kaspersky Lab     Published Date: Dec 12, 2014
Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task. Download Part II: Reducing Mobile, Web, and Social Media Risks.
Tags : kaspersky, it security, best practice, hygiene, sensitive information, security breach, secure passwords, mobile risks
     Kaspersky Lab
By: Melissa Data     Published Date: Nov 18, 2008
This white paper describes the seven steps you need to develop a plan for data quality – one that scales to your growing business needs.
Tags : melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software
     Melissa Data
By: Melissa Data     Published Date: Nov 18, 2008
What are the long-term costs of bad data? This white paper gives you the answers and tells you how to fix it.
Tags : melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software
     Melissa Data
By: Melissa Data     Published Date: Nov 18, 2008
Learn what a Web Service is and how it works, the advantages of using a Data Quality Web Service, the technology assessment for implementation, and several case studies (Saab and other real world case studies) to demonstrate real life successes.
Tags : melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software
     Melissa Data
By: Melissa Data     Published Date: Nov 18, 2008
Tom Brennan and John Nydam explain the Melissa Data and Stalworth partnership, discuss the business problems caused by bad data, and describe how DQ*Plus provides a complete data quality solution for enterprise applications and commercial databases.
Tags : melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software
     Melissa Data
By: CrowdStrike     Published Date: Feb 14, 2019
How to navigate a crowded vendor landscape and find the best endpoint protection solution According to the 2018 SANS Endpoint Security Survey, more than 80 percent of known breaches involve an endpoint. That’s why finding the most effective endpoint protection has never been more important. Unfortunately, with hundreds of options on the market, all claiming the same “next-gen” features, choosing the best endpoint security for your organization can be challenging. Read the Endpoint Protection Buyers Guide to learn: • Why you should ensure that the solution you choose includes these five key elements: prevention (NGAV), detection (EDR), managed threat hunting (MDR), threat intelligence, and IT hygiene and vulnerability assessment • Details on the role each of these elements plays in ensuring your organization’s security • The evaluation criteria you should apply and questions to ask to ensure a solution is truly effective • How the cloud-native CrowdStrike Falcon® next-gen endpoint prote
Tags : 
     CrowdStrike
By: Melissa Data Corp.     Published Date: Nov 18, 2008
This white paper describes the seven steps you need to develop a plan for data quality – one that scales to your growing business needs.
Tags : melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software
     Melissa Data Corp.
By: Melissa Data Corp.     Published Date: Nov 18, 2008
What are the long-term costs of bad data? This white paper gives you the answers and tells you how to fix it.
Tags : melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software
     Melissa Data Corp.
By: BlueHornet     Published Date: Jun 06, 2008
Your online brand reputation can affect many areas of email marketing, including acquisition strategy, list hygiene, delivery, and conversion rates. Join experts from BlueHornet's Deliverability & Privacy Services team and Pivotal Veracity to learn ways to assess and manage your online brand reputation more easily.
Tags : email marketing, email messaging, blue hornet, bluehornet, branding, reputation, email marketing services/software
     BlueHornet
By: StrikeIron     Published Date: Oct 03, 2013
Learn the best practices from StrikeIron's Email Verification Plus Hygiene technology and how this cloud-based & powerful technology goes through a four-step process to validate emails in real time.
Tags : email campaign performance, improve sender reputation, email verification, strikeiron, email verification plus hygiene, cloud, technology, emails
     StrikeIron
By: NetProspex     Published Date: Nov 04, 2013
Learn why many marketers are turning to vendors to handle the hygiene process to make their data more actionable and see what questions they are asking to ensure they have chosen the right vendor.
Tags : marketing data services, marketing data management, marketing data quality, installed technology list, international contact data, business contact list, marketing database list, marketing database services
     NetProspex
By: Marketo     Published Date: Jul 12, 2017
Unfortunately, we’ve all been there. Every now and then, we make cringe-worthy mistakes. But the mistakes that haunt us in our personal lives often aren’t as public as email marketing mistakes, which go out to hundreds and thousands of subscribers. Download this ebook to learn about the eight most common email marketing pitfalls and how you can avoid or fix them: Mistake 1: Unclear subject lines Mistake 2: Poor email list hygiene Mistake 3: Failure to measure email inboxing Mistake 4: No engagement segmentation Mistake 5: No re-engagement strategy Mistake 6: Using image-based CTA buttons Mistake 7: No mobile optimization Mistake 8: Bad testing decisions
Tags : continuously opened emails, engagement, unique clicks, multiple clicks, cleaning campaign, sender reputation, marketo, marketing
     Marketo
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics