RSS feed Get our RSS feed

News by Topic

breaches

Results 76 - 100 of 389Sort Results By: Published Date | Title | Company Name
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Organizations around the world are embracing the economic and operational benefits of cloud computing. Whether organizations are extending internal resources or fully deploying on Microsoft Azure, the ability to take advantage of the business benefits of cloud require that organizations continue to meet key security requirements. Azure delivers a trusted cloud infrastructure on which customers can design, build and manage their own cloud applications and infrastructure. While Azure provides security controls for the infrastructure and change to virtualization layers, deploying organizations are responsible for deploying and maintaining security for the guest operating systems, applications, and data in order to protect against malware attacks, zero-day vulnerabilities and data breaches. Read this white paper to lean more about Trend Micro Instant-On Cloud Security for Microsoft Azure.
Tags : cloud security, microsoft azure, cloud computing, cloud infrastructure, malware attacks, data breaches, trend micro, security
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
The targeted attacks and advanced threats that are increasingly used to breach enterprise networks are purpose-built to evade traditional defenses. Enterprises require an advanced approach to protection that identifies these attacks and enables organizations to prevent breaches and their costly consequences. Read this white paper to learn how the Trend Micro Custom Defense can prevent the collateral damage associated with targeted attacks and advanced threats.
Tags : custom defense, security threats, enterprise networks, intellectual property, security
     CDW-Trend Micro
By: Centrify Corporation     Published Date: Apr 13, 2018
As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. Leading companies have ramped up their investments in cybersecurity, yet that spending is often not well aligned with actual threats. Studies have shown that server-focused solutions such as network anti-virus, malware detection and website firewalls attract the biggest investments, ignoring the fact that misuse of privileged credentials is by far the most common cause of breaches. The reasons for this disconnect are not well understood, in part because it sits at the intersection of the people and technology domains. This survey, conducted by WSJ Custom Studios with sponsorship from Centrify, seeks insights into senior-level thinking on this issue, including current cybersecurity priorities and the perceived degree of alignment between threats and solutions.
Tags : 
     Centrify Corporation
By: Centrify Corporation     Published Date: May 22, 2018
A significant paradigm shift occurred in the last few years. Much like other technological shifts of the last decade — when cloud computing changed the way we do business, agile changed the way we develop software and Amazon changed the way we shop — Zero Trust presents us with a new paradigm in how we secure our organizations, our data and our employees. While difficult to identify the precise tipping point, one thing is certain: what were once extraordinarily high-profile, damaging breaches are no longer extraordinary. In just the last 18 months, Yahoo, Accenture, HBO, Verizon, Uber, Equifax, Deloitte, the U.S. SEC, the RNC, the DNC, the OPM, HP, Oracle and a profusion of attacks aimed at the SMB market have all proven that every organization — public or private — is susceptible. The epiphany behind the paradigm shift is clear: Widely-accepted security approaches based on bolstering a trusted network do not work. And they never will. Especially when businesses are dealing with skill
Tags : 
     Centrify Corporation
By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : security solutions, protecting data, secure management, cost-effective, security
     Centrify Corporation
By: CenturyLink     Published Date: Nov 18, 2011
See how Payment Card Industry compliance can keep customer data safe and strengthen your business.
Tags : centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
     CenturyLink
By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps companies comply with AB 1950, allowing companies to use automated processes to manage their security. Hailstorm is a key tool for preventing breaches.
Tags : identity theft, application security, password management, security management, compliance, california sb 1386, senate bill 1386, ab 1950
     Cenzic
By: CheckMarx     Published Date: Jun 07, 2019
Data breaches continuing to make the headlines and enterprises are no longer questioning "if" a breach will occur, but "when." With the organization's data assets and reputation at stake, having a breach response plan in place is becoming increasingly important. Join security thought leaders and experts for an interactive Q&A to learn more about: - Today’s cybersecurity threat landscape - The true costs of a breach - Preventing breaches: Key factors to consider - Why early breach detection is critical - How to develop an effective incident response plan and get C-Suite buy-in - How to keep your company secure in 2019"
Tags : 
     CheckMarx
By: CheckMarx     Published Date: Jun 21, 2019
DevSecOps, modern web application design and high-profile breaches are expanding the scope of the AST market. Security and risk management leaders will need to meet tighter deadlines and test more complex applications by accelerating efforts to integrate and automate AST in the software life cycle.
Tags : 
     CheckMarx
By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
     Cisco
By: Cisco     Published Date: May 24, 2019
Prevent breaches, get deep visibility to detect and stop threats fast, and automate your network and security operations to save time and work smart. Here are 5 tips to keep in mind when choosing a Next Generation Firewall for your business.
Tags : 
     Cisco
By: Cisco EMEA     Published Date: Nov 13, 2017
In the not so distant past, the way we worked looked very different. Most work was done in an office, on desktops that were always connected to the corporate network. The applications and infrastructure that we used sat behind a firewall. Branch offices would backhaul traffic to headquarters, so they would get the same security protection. The focus from a security perspective was to secure the network perimeter. Today, that picture has changed a great deal.
Tags : malware, ransomware, compromised accounts, malicious insiders, visibility, coverage, data breaches, compliance
     Cisco EMEA
By: Cisco EMEA     Published Date: Mar 05, 2018
The operation of your organization depends, at least in part, on its data. You can avoid fines and remediation costs, protect your organization’s reputation and employee morale, and maintain business continuity by building a capability to detect and respond to incidents effectively. The simplicity of the incident response process can be misleading. We recommend tabletop exercises as an important step in pressure-testing your program.
Tags : human resources, cisco, employees, data, analysis
     Cisco EMEA
By: Cisco EMEA     Published Date: Mar 26, 2019
Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally. As a result, customers are asking more questions during the buying cycle about how their data is captured, used, transferred, shared, stored, and destroyed. In last year’s study (Cisco 2018 Privacy Maturity Benchmark Study), Cisco introduced data and insights regarding how these privacy concerns were negatively impacting the buying cycle and timelines. This year’s research updates those findings and explores the benefits associated with privacy investment. Cisco’s Data Privacy Benchmark Study utilizes data from Cisco’s Annual Cybersecurity Benchma
Tags : 
     Cisco EMEA
By: Cisco EMEA     Published Date: Jun 19, 2019
The EU’s General Data Protection Regulation (GDPR) became enforceable on May 25, 2018, and privacy laws and regulations around the globe continue to evolve and expand. Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally.
Tags : 
     Cisco EMEA
By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Organization: Telecom Italia (TIM) Headquarters: Milan, Italy Users: 600,000 Objective: As Italy’s businesses grew increasingly vulnerable to the threat of ransomware, data breaches, and other malicious malware attacks, service provider TIM sought an innovative solution to effectively and efficiently protect the network and data of its business users. Solution: Cisco Umbrella for Service Providers (SPs) Impact: • Rolled out TIM Safe Web to more than 600,000 customers, with less than 1 in 10,000 customers opting out of the service • Provided TIM with a unique competitive differentiator • Created an incremental revenue stream for TIM
Tags : 
     Cisco Umbrella EMEA
By: Citrix ShareFile     Published Date: Jul 11, 2017
The General Data Protection Regulation(GDPR) was approved and adopted by the EU Parliament in April 2016 with the goal to protect all EU citizens from privacy and data breaches. What is the scope of the GDPR? How does it impact your organisation? This white paper guides you so your organization can meet the needs of GDPR.
Tags : data security, data protection, risk reduction, security regulation, data breach
     Citrix ShareFile
By: Commvault ABM Oct     Published Date: Jul 17, 2019
Enterprises are cobbling together all the pieces that make up a digital business - improved analytics, scalable architecture, automation, and more engaging customer experiences, just to name a few. At the same time, they're facing the ever-present threats of cyber attacks and data breaches.
Tags : 
     Commvault ABM Oct
By: Concerto Cloud Services     Published Date: Dec 18, 2015
The purpose of this article is to provide the reader with several key insights that can better prepare your organization for mitigating security breaches
Tags : 
     Concerto Cloud Services
By: Courion     Published Date: Aug 21, 2012
Hear from a panel of experts as they discuss the factors that impact enterprise security strategy, including regulatory pressures, demands from audit to demonstrate compliance, the increasing risk of data breaches.
Tags : access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance
     Courion
By: Cox Business     Published Date: Dec 19, 2016
As we continue to move forward into an age of big data, optimization, and shared information through the capabilities of better networking technologies, opportunities have never been greater for using technology to improve the way the government interacts with constituents. However, increasing dependence on web and network services also makes government a tempting target for hackers. Distributed Denial of Service attacks, data breaches, leaks, the risks can be enormous. Recent events have shown us that now more than ever, government servers are getting victimized by well-funded teams of foreign hackers, possibly funded by their government.
Tags : 
     Cox Business
By: CradlePoint     Published Date: Sep 04, 2014
Every year, the public relations specialists from at least one bluechip company invariably find themselves working around the clock on a crisis communications effort, attempting to explain to an angry and justifiably fearful public what led to their company compromising customer data. There’s always an immediate hit to the company’s reputation, resulting in a loss of brand loyalty, as customers take their business elsewhere. This white paper provides strategies and best practices for distributed enterprises to protect their networks against vulnerabilities, threats, and malicious attacks.
Tags : security risks, crisis communications, security breaches, compromising customer data, security
     CradlePoint
By: CradlePoint     Published Date: Sep 30, 2014
While short outages are common, longer service disruptions – due to weather, human error or even squirrels – can be catastrophic, paralyzing business operations. Your organization can feel the consequences long after the connection has been repaired. This white paper explores the benefits of using 4G LTE as a back up solution to maximize revenue and minimize business risk downtime can have on your brand. You’ll learn how a 4G wireless solution has benefits over wired backup solutions for business continuity. Please download the whitepaper to learn more!
Tags : failover, security risks, crisis communications, security breaches, compromising customer data, security
     CradlePoint
By: CrowdStrike     Published Date: Feb 01, 2017
The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Feb 01, 2017
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. Download the white paper to learn: • How to detect known and unknown threats by applying high-volume graph-based technology, similar to the ones developed by Facebook and Google • How CrowdStrike solved this challenge by building its own proprietary graph data model • How CrowdStrike Threat Graph™ collects and analyzes massive volumes of security-related data to stop breaches
Tags : 
     CrowdStrike
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics