RSS feed Get our RSS feed

News by Topic

threat prevention

Results 1 - 25 of 82Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation
     IBM
By: McAfee     Published Date: Mar 31, 2017
Behind the vast majority of legitimate alerts sent to the IT security team is an attacker who exploits multiple attack techniques to infiltrate your infrastructure and compromise your critical data and systems. Targeted multi-phased attacks include a series of cyber attack chain steps: recognition, vulnerability analysis, operation and, finally, exfiltration of critical business data.
Tags : cyber threats, threat intelligence, cyber attack, cyber attack prevention
     McAfee
By: IBM     Published Date: Apr 20, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation
     IBM
By: IBM     Published Date: Jun 22, 2017
Security threats are very real, and the stakes are higher than ever. Each day, tens of thousands of malware variants are created, with new classes of threats continually added and improved upon. Savvy attackers use polymorphic programs to alter malware into new form factors after each delivery. And all of this is exacerbated by the proliferation of mobile devices, cloud computing and social media—in fact, the intersection of these technologies provides fertile new ground for threats and malware. Today’s attacks are often not random, but targeted for maximum financial gain and impact. Rogue individuals and groups are constantly innovating new ways to attack organizations’ most valuable assets. As a result, traditional methods of dealing with threats are no longer enough. Organizations need more threat intelligence than ever before in order to effectively protect themselves.
Tags : cyber security, global threat intelligence, malware prevention, cyber threat, protection
     IBM
By: Websense     Published Date: Jul 08, 2014
A white paper by Websense examining how anomalies in crash reports can be used to detect unknown threats.
Tags : detecting unknown threats, websense, next-generation firewall
     Websense
By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jun 26, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, storage
     Blue Coat Systems
By: IBM     Published Date: Oct 26, 2016
Predictive analytics transforms organizations. Watch this video to see how predictive analytics can improve outcomes in four strategic areas critical to the success of your business: - Customer satisfaction and retention - More effective HR processes - Fraud and threat detection and prevention - Revenue growth and profitability
Tags : ibm, analytics, predictive analytics
     IBM
By: Palo Alto Networks     Published Date: Feb 24, 2016
The threat landscape has evolved and the traditional approach to endpoint security cannot keep up. Detection/response is not an acceptable approach. There are a number of approaches to prevent threats on the endpoint and their ability to prevent unknown and zero-day threats varies widely. Join this webinar featuring a guest speaker from Forrester where we will discuss the findings from a recent commissioned survey they conducted that evaluates these approaches and illustrates that exploit prevention and integration with a network security platform are must-have capabilities. Forrester will also summarize their recommendations for prevention of advanced threats on the endpoint.
Tags : security, endpoint, zero day exploit, forrester, phishing, ddos
     Palo Alto Networks
By: Vectra Networks     Published Date: Aug 03, 2015
Protect against advanced attacks.
Tags : threat, data, security, it management, budget, firewall, intrusion detection, intrusion prevention
     Vectra Networks
By: Sophos     Published Date: Mar 30, 2017
Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for years—social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones. Such attacks are neither advanced nor particularly sophisticated when broken down into their individual components and often rely on the weakest link in any organization—the user. However, the way in which hackers use combinations of techniques and the persistent behavior of the attackers is something that does set APTs apart from other attempts to compromise security. This paper is designed to give you an overview of the common characteristics of APTs, how they typically work, and what kind of protection is available to help reduce the risk of an attack.
Tags : network security, firewall, data security, antivirus protection, email protection, virtual security, web protection, wireless protection
     Sophos
By: EMC Corporation     Published Date: May 27, 2014
RSA Technical Brief: The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions. This technical brief discusses why combating advanced threats depends on organizations shifting more security resources from prevention to detection and remediation, and developing intelligence-driven security programs.
Tags : emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
     EMC Corporation
By: BAE Systems     Published Date: Dec 29, 2015
Find an approach that stops dangerous email leaks, keeps things simple, and lets you go about your business with minimal disruption
Tags : bae systems, applied intelligence, email, insider threat prevention, data breach, data loss, intellectual property, byod
     BAE Systems
By: IBM     Published Date: Jan 11, 2017
Download this eBook to learn: - How the use of advanced analytics generates powerful insights to stay ahead of evolving cyber threats - Why Cyber Threat Analysis is the most effective defensive strategy - How analysts benefit from the use of sophisticated data visualization to identify hidden threat relationships and patterns - Why shifting from attack prevention to mitigation is a more practical goal for commercial organizations
Tags : ibm, analytics, public sector, security, cyber threat, cyber threat analysis, risk
     IBM
By: Splunk     Published Date: Sep 17, 2012
Read this white paper to understand the evolving security landscape and how advanced persistent threats and sophisticated malware have fundamentally changed the way security teams must think about threats and the tools used for detective controls.
Tags : security threats, it security infrastructure, data protection, data loss prevention, data management, security intelligence, security
     Splunk
By: Forrester Research     Published Date: Apr 27, 2015
Report | Recommendations for Enterprise Security in 2015
Tags : security, vulnerability management, analytics, threat prevention, cyber attacks
     Forrester Research
By: Forrester Research     Published Date: Apr 27, 2015
Download the report to learn how to prepare an Incident Response Plan that ensures your business recovers quickly and effectively.
Tags : security, vulnerability management, analytics, threat prevention, cyber attacks
     Forrester Research
By: Tripwire     Published Date: Feb 08, 2013
Continuous monitoring is not a single solution—it’s a best practice for IT security.
Tags : automation, continuous monitoring, security, threat detection, threat prevention, hacker, malware, cyber attack
     Tripwire
By: HP Software     Published Date: Feb 02, 2016
An average of 30,000 new websites are identified as distributing malicious code to site visitors every day. According to a recent Spiceworks survey, IT professionals are relying mostly on software level security solutions. Download this whitepaper to learn how HP Elitebooks block and outsmart security threats.
Tags : security, bios, threat prevention, threat detection, malware, hacking
     HP Software
By: Kaspersky     Published Date: Feb 05, 2015
This paper gives information about how Automatic Exploit Prevention significantly reduces the risk of infection from widespread malware, or more targeted attacks using exploits – even when a zero-day vulnerability is used.
Tags : benefits to enterprise it security, exploit prevention, protection from exploits, software attacks
     Kaspersky
By: SpectorSoft     Published Date: Aug 20, 2013
Quickly detect and be alerted to insider threats by monitoring employee activity with this free trial from Spector 360.
Tags : monitor employee, employee tracking, monitor computer activity, employee monitoring software, data loss protection, track web usage, detect fraud, insider threat
     SpectorSoft
By: McAfee     Published Date: Jan 23, 2013
A criminal industry develops. This paper explores bot evolution, it’s global prevalence, who’s at risk, a look forward and combating bots using Global Threat Intelligence.
Tags : botnets, bots, defense in depth, threat prevention, advanced attacks, malware
     McAfee
By: Panda Security     Published Date: Feb 06, 2008
Today’s targeted malware attacks are infecting unsuspecting businesses at astonishing rates, rendering traditional antivirus solutions ineffective. Reported and known viruses are becoming less important compared to the increase in unknown threats and attacks.
Tags : security, threats, ips, intrusion prevention, internet security, hackers, hacker, virus
     Panda Security
By: Webroot UK     Published Date: Nov 11, 2009
This report highlights ways Best-in-Class organizations harden themselves against threats from email.
Tags : webroot, email security, threats, spam, data security policy, knowledge management, performance management, encrytion
     Webroot UK
Start   Previous   1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics