RSS feed Get our RSS feed

News by Topic

security issues

Results 1 - 25 of 126Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: Sep 27, 2016
Learn about the origins, tactics, types, and targets of cyber- attacks and emerging threats and trends from post-attack analysis and intelligence by cybersecurity and DDoS mitigation experts. Includes quarter-over-quarter and year-over-year trends, plus spotlights on recent DDoS and web application attacks and review of the past quarter’s hot-topic issues in cybersecurity.
Tags : akamai, state of the internet, security, security report, cybersecurity, ddos, analytics
     Akamai Technologies
By: Akamai Technologies     Published Date: May 05, 2017
Security and performance were once considered separate issues requiring very different solutions. But now that malicious hackers have discovered new and better ways to affect both aspects of a website, you need solutions that can plug security holes while enhancing frontend performance. How is that possible? In this report, we explore browser-based solutions that can beef up security and enhance end-user performance in one stroke. This report examines several techniques for dealing with third party content issues in the browser, including HSTS, iframe, and prefetch. It also dives into service workers and browser-based scripts that provide many security and performance options. Download it now and learn how you can jointly improve security and increase performance.
Tags : cyber security, security, web linking, performance
     Akamai Technologies
By: Akamai Technologies     Published Date: Aug 17, 2017
More often than not, performance and security are thought of as two separate issues that require two separate solutions. This is mainly due to the implications posed behind various performance and security products. We typically have either security solutions or performance solutions, but rarely solutions that offer both. As technology has advanced, so have our attackers, finding newer and better ways to impact both the performance and security of a site. With this in mind, it has become even more critical to come up with solutions that bridge the gap between security and performance. But how do we do that? We need to shift the focus to what we can do at the browser by leveraging various frontend techniques, such as web linking and obfuscation, versus solely relying upon the capabilities of a content delivery network (CDN) or the origin. We can take advantage of all the new and emerging frontend technologies to help provide a secure and optimal experience for users—all starting at the
Tags : frontend performance, security, technology, content delivery, web linking
     Akamai Technologies
By: Akamai Technologies     Published Date: Mar 19, 2019
All three of our stories in this issue of the State of the Internet / Security report are about things most organizations aren’t examining. Whether the cause is that organizations don’t perceive some issues as important to their environment, if they don’t have tooling to monitor these issues, or if the resources to monitor this traffic are not available, this traffic is often being overlooked. Each of the stories in this issue of the State of the Internet / Security report looked at aspects of security (credential abuse/APIs/IPv6) that are often overlooked by the mainstream but are nevertheless important to day-to-day operations. These stories create a backdrop for what we expect to see in the upcoming quarters and years.
Tags : 
     Akamai Technologies
By: Aladdin     Published Date: Aug 21, 2009
In this Aladdin white paper you will discover an overview of spyware, security threats seen with spyware, the technical underpinnings to spyware, the technology challenges inherent in trying to block spyware, and spyware's legal issues.
Tags : spyware, malware, antispyware, anti-spyware, anti spyware, email security, aladdin, security
     Aladdin
By: ALE     Published Date: Jan 10, 2019
Campus Cybersecurity is a perennial ‘top of mind’ topic for Higher Education. For the second time in three years, information security topped Educause’s annual Higher Ed CIO Top 10 IT Issues survey. This should come as no surprise according to the latest Verizon Data Breach Investigations Report (DBIR). The report, which shows cybercriminal activity trending upwards, identifies the three most targeted industries as Financial and Insurance, Healthcare, and Education. To find out more, download this whitepaper today.
Tags : 
     ALE
By: Amazon Web Services     Published Date: Nov 28, 2017
So you’re thinking about moving to the cloud. Which means you’ve got some new (and some old) security issues to think about. Where do you start? What should you look for when you’re planning your cloud migration or expansion, and what features do you need to tick off your list when you compare partners for the project? At AWS, we’ve worked with millions of cloud users in 190 countries, from all kinds of industries – large enterprise, start-ups, non-profits, education and government. Every organisation's needs are different, but we’ve identified the top features of any successful cloud security initiative. Here are six must-haves for cloud security confidence.
Tags : integration, security, compliance, visibility, control, privacy, data, marketplace
     Amazon Web Services
By: ArborNetworks     Published Date: Feb 12, 2016
Ask any cybersecurity professional and she’ll tell you that her job is getting increasingly difficult. Why? Most will point to a combination of the dangerous threat landscape, IT complexity, and their overwhelming workload. These issues are driving a major transition in enterprise security. Large organizations must move beyond a threat prevention mentality to become proactive cyber-¬-attack “hunters” that constantly monitor their networks for signs of trouble. This shift to proactive hunting will require new technologies that collect, process, and analyze massive amounts of security data, offer intelligent security analytics for real-¬-time incident detection, integrate threat intelligence to align suspicious internal activities with external threats, and provide analysts with the right data analytics features to query and manipulate data for historical investigations.
Tags : arbor networks, enterprise, cyber attack, network, data, security
     ArborNetworks
By: Aviatrix     Published Date: Jun 11, 2018
Once you've designed and secured your Global Transit Network, are you done? Are you ready to hand day-to-day responsibility over to an operations team? Or, are there other elements you need to ensure that the day-to-day operation of your transit hub is efficient and effective? As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, demonstrate the best practices they've gleaned from working with operations teams, all who require: • Visibility: Do you have a way to centrally view your network, see performance bottlenecks, control security policies, and set other configuration details? • Deep Analytics: Can you easily gather performance and audit data and export it to Splunk, DataDog, or other advanced reporting tools? • Monitoring and Troubleshooting: Do you have a real-time view of network health, and how easily can you access the data needed to locate and fix issues? • Alert Management: When issues do occur, what r
Tags : aws, aws vpc, aws global transit network, aws transit vpc, cisco csr, csr 1000v
     Aviatrix
By: BlackBerry     Published Date: May 22, 2008
Over the past decade, wireless technology has made huge strides in security, reliability and throughput. Companies that are moving forward with business mobility initiatives must plan for wireless security and mobile device management from the start. Learn about many of the notable trends and key issues associated with Business Mobility and where to find additional resources for consideration.
Tags : blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange
     BlackBerry
By: BlackBerry Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : safe, lite, cybersecurity, data
     BlackBerry Cylance
By: BMC ASEAN     Published Date: Dec 18, 2018
Today’s IT environments are so dynamic and complex that traditional manual administration makes it virtually impossible to keep pace with changing business opportunities and challenges, such as scaling to support new applications and users. Manual administration is not just unsustainable—it’s dangerous. Delays in responding to security threats and compliance issues can have devastating effects: • Security breaches • Failed audits • Financial losses • Loss of customers and reputation • Other serious business consequences To sustain a high level of security and compliance, IT teams must implement a comprehensive, aggressive automation strategy that establishes and tracks key performance indicators. Automation helps to optimize resources, increase efficiencies, lower costs and improve quality of service. This white paper describes principles and best practices for implementing automation as a strategic asset in the ongoing effort to achieve security and compliance excellence in a dynamic
Tags : 
     BMC ASEAN
By: Box     Published Date: Feb 13, 2015
Many CISOs admit to trepidation about the state of cybersecurity within their organizations. Why? Aside from the increasingly dangerous threat landscape, many large organizations face other security challenges, including personnel shortages, an overwhelming number of manual processes, and technology complexity. Beyond these issues however, CISOs also face the progressively difficult responsibility of securing the distributed enterprise. Aside from PCs, departmental file servers, and remote office equipment, the distributed enterprise now includes recent IT additions like mobile computing, SaaS applications, and hybrid cloud infrastructure. In aggregate, this increasingly distributed infrastructure makes information security more cumbersome.
Tags : ciso, cybersecurity, esg, it/security, it architecture
     Box
By: Brainloop     Published Date: Oct 25, 2011
External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.
Tags : cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection
     Brainloop
By: Brainloop     Published Date: Nov 09, 2011
This white paper by Cheryl Klein, CPA, CISA, CITP, analyzes 10 questions that help identify compliance risks in your company. The 10 scenarios illustrate smart, cost-effective strategies for SOX, PII, HIPPA and security policy issues.
Tags : brainloop, security, compliance risks, sharing information, security management, data protection
     Brainloop
By: Butler Technologies     Published Date: Jul 02, 2018
The Tenth Annual State of the Network Global Study focuses a lens on the network team’s role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60 percent and software-defined networking (SDN) is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. With growth comes change and some trends identified in this year’s survey include a rise in email and browser-based malware attacks (63 percent) and an increase in sophistication (52 percent). Nearly 1 in 3 also report a surge in DDoS attacks, signaling a ne
Tags : 
     Butler Technologies
By: CA Mainframe     Published Date: Sep 12, 2008
Compliance requires strong security controls for mainframe environments also. This white paper discusses some major challenges that mainframes bring to compliance, and some key issues that need to be addressed. It also presents some key technologies and approaches that you can use to help you achieve easier compliance for your mainframe systems.
Tags : ca mainframe, mainframe, compliance
     CA Mainframe
By: CA Technologies     Published Date: Jan 14, 2015
Whether you were at the forefront of the mobility era or are just now catching up—or, most likely, somewhere in between—you’ve already experienced first-hand the business impact of ubiquitous smartphones and tablets. From employees to customers, mobile devices spawned an explosion in new applications, data, support needs, security concerns, and other issues. They’ve reset expectations for organizational speed and flexibility. They’ve dramatically increased the surface area for potential security attacks. All this, and the mobile era is still just in its infancy.
Tags : mobile busienss, smartphones, tablets, applications, data, support needs, security attacks, organizational speed
     CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solutions that are available to deal with these issues. It compares their technology, the market position each vendor has achieved, their ability to execute, and the overall maturity of each offering.
Tags : data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management
     CA Technologies
By: CA Technologies EMEA     Published Date: Aug 07, 2017
The European General Data Protection Regulation (GDPR) will be upon us on May 25th 2018, and contrary to enduring public opinion, Brexit won’t make any difference. The GDPR comes in response to global shuffling of privacy laws to meet the growing demands of cloud, data security and other technological needs. The US Safe Harbor framework has been replaced with Privacy Shield, and on top of this is the e-Privacy Regulation, which takes specific interest in electronic communications, cookies for tracking user behaviour online, and other issues around personal data and consent.
Tags : gdpr, storage, access management, personal data, software development, ca technologies, anonymize data, privacy projects
     CA Technologies EMEA
By: Carbon Black     Published Date: Aug 20, 2018
Companies are facing massive cyber security challenges – many of which are rooted in the endpoint. In fact, according to IDC, 70% of successful breaches begin at the endpoint. If you are a Kaspersky Lab customer, and still have breaches in your endpoint security, then something isn’t working. Perhaps you’re struggling to prevent advanced attacks, or your security team may be burdened by maintaining overly complex policies. You and your end users may even be facing performance issues. If you are experiencing any of these issues, then your endpoint security products may actually be creating more problems than they solve. Ask these questions and find out for yourself.
Tags : 
     Carbon Black
By: Carbon Black     Published Date: Aug 20, 2018
Companies are facing massive cyber security challenges – many of which are rooted in the endpoint. In fact, according to IDC, 70% of successful breaches begin at the endpoint. If you are a McAfee customer, and still have breaches in your endpoint security, then something isn’t working. Perhaps you’re struggling to prevent advanced attacks, or your security team may be burdened by maintaining overly complex policies. You and your end users may even be facing performance issues. If you are experiencing any of these challenges, then your endpoint security products may actually be creating more problems than they solve. Ask yourself these questions for a cybersecurity reality check.
Tags : 
     Carbon Black
By: Carbon Black     Published Date: Nov 26, 2018
Companies are facing massive cyber security challenges – many of which are rooted in the endpoint. In fact, according to IDC, 70% of successful breaches begin at the endpoint. If you are a McAfee customer, and still have breaches in your endpoint security, then something isn’t working. Perhaps you’re struggling to prevent advanced attacks, or your security team may be burdened by maintaining overly complex policies. You and your end users may even be facing performance issues. If you are experiencing any of these challenges, then your endpoint security products may actually be creating more problems than they solve. Ask yourself these questions for a cybersecurity reality check.
Tags : 
     Carbon Black
By: CDW     Published Date: Oct 10, 2013
A team approach and careful consideration of operational and security issues will pave the way for effective guidance. The drivers are many, but big draws include the potential for greater productivity — giving people anywhere, anytime access to information via devices they’re comfortable with.
Tags : mobile device policy, mobile data policy, mobility goals, byod, user profile, device security, mobile applications, app availability
     CDW
By: CDW     Published Date: Dec 29, 2014
Learn the best practices for migrating to a new server operating system and see how the switch may be challenging, but will allow your organization to vastly improve IT operations to support new technologies such as cloud computing.
Tags : server, data center, transformation, scalability, performance, operating system, microsoft, cloud computing
     CDW
Start   Previous   1 2 3 4 5 6    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics