cyber crime

Results 101 - 125 of 196Sort Results By: Published Date | Title | Company Name

The Busy IT Professional's Guide to Governance, Risk and Compliance (GRC): Top 5 Tips For Simpler

Published By: Lumension     Published Date: Mar 31, 2012
Streamline your compliance efforts by implementing these five tips that will help you better tie together security deployments and processes, business goals and compliance activities.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
Lumension

Zero Trust with John Kindervag

Published By: NetIQ     Published Date: Jul 27, 2011
In this on-demand webinar, John Kindervag, Senior Analyst at Forrester Research, defines "zero-trust architecture," outlines the 5 steps needed to make this model actionable, and explains how his clients are adopting a "zero-trust architecture."
Tags : 
zero trust, netiq, advanced threats, apt prevention, cybercrime, incident response, network analysis and visibility, network forensics
    
NetIQ

Security Essentials for Mobile Devices: 10 Tips for Your Company Policy

Published By: Cisco     Published Date: Jan 20, 2012
This white paper discusses 10 important tips your organization can use to secure employees' mobile devices. Read on!
Tags : 
mobile devices, smart phones, cybercrime, mobile, policy, cisco, transition, communication
    
Cisco

Why Malicious Cyberactivities Are “The Greatest Transfer of Wealth in Human History"

Published By: McAfee     Published Date: Apr 25, 2014
Estimating the cost of malicious cyberactivities is complicated. But the real issue is how it affects trade, technology, and economic competition. This in-depth report takes a look at the scope of the problem and what factors determine the real cost of cybercrime.
Tags : 
cybercrime, cyberespionage, data loss, intellectual property loss, reputational damage, security costs, commercial espionage, business confidential information
    
McAfee

Intelligence-Led Security: Develop a Concrete Plan

Published By: Cyveillance     Published Date: Apr 03, 2015
Protecting a business – including its information and intellectual property, physical infrastructure, employees, and reputation – has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Like many security trends and frameworks, the early stages of adoption often involve inconsistent definitions, challenges with justification and management communication and an unknown path to implementation. In this white paper, we: • Review the current threatscape and why it requires this new approach • Offer a clarifying definition of what cyber threat Intelligence is • Describe how to communicate its value to the business and • Lay out some concrete initial steps toward implementing Intelligence-Led Security
Tags : 
intellectual property, hackers, protection, leaks, security, threatscape, networking
    
Cyveillance

The Rising Face of Cyber Crime: Ransomware

Published By: BitSight Technologies     Published Date: Sep 26, 2016
Learn how ransomware is evolving - and which industries are the most susceptible to attacks. Read this BitSight Insights report to learn: - How the rate of ransomware infections has grown over the past year - Which industries have exhibited the most ransomware infections - How businesses can directly mitigate the threat of ransomware infections, as well as infections originating from third party vendors and suppliers
Tags : 
bitsight, cyber crime, cyber attacks, ransomware, cyber security, security, enterprise applications, business technology
    
BitSight Technologies

A Guide to Web Protection

Published By: LogicNow     Published Date: Mar 10, 2016
Cyber crime is one of the most innovative businesses in existence today – and make no mistake, it is a business. This guide looks at how cyber crime has evolved and continues to evolve - and the necessity now of taking a user-focused approach to network security. If you’re in the business of helping your customers businesses stay secure – or if you’re thinking about it
Tags : 
logicnow, web protection, cyber crime, cyber security, security, best practices, enterprise software, risk management
    
LogicNow

Fraud alert: Phishing - The latest tactics and potential business impacts 2012

Published By: Symantec.cloud     Published Date: Oct 11, 2012
As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years .
Tags : 
symantec, phishing, malware, security, internet security, business technology
    
Symantec.cloud

Discovering Vulnerable Web Applications

Published By: Qualys     Published Date: Nov 05, 2013
Vulnerabilities in web applications are a major vector for cyber-crime. In large organizations, vulnerable web applications comprised 54% of all hacking breaches and led to 39% of compromised records, according to the 2012 Data Breach Investigation Report by Verizon Business. This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization’s overall vulnerability management program.
Tags : 
qualys, qualysguard was, vulnerability, vulnerability management, web applications, applications, vulnerable web applications, cybercrime
    
Qualys

Shortcut Guide to Business Security Measures Using SSL

Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 15, 2011
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, measures, green bar, online security, optimize, sgc, server gated cryptography, verisign
    
VeriSign Authentication Services, now a part of Symantec Corp.

Survey: Remote Users Expose Companies to Cybercrime

Published By: Webroot     Published Date: Sep 18, 2013
Webroot conducted research on web security in the US and the UK. As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities. The impacts of web-borne attacks are also more severe for companies with employees who have remote access to the corporate network or other corporate online resource via their laptops, tablets or smartphones. • 90% of companies agree that managing the security of remote users is extremely challenging • Twice as many companies with remote users reported Web-borne attacks by criminals, which compromised the security of customer data • 50% of firms with remote users say web-borne attacks impacted company financials
Tags : 
security, remote users, cybercrime, web attacks, malware, phishing, mobile browser security, mobile device
    
Webroot

Small Business is Big Business in Cybercrime

Published By: Trend Micro Inc.     Published Date: Sep 21, 2011
For cybercriminals, no business is too small to exploit. Albeit being under a relatively smaller spotlight than typical enterprises, small businesses can ill afford to take the threat cybercrimes pose for granted. Myths abound regarding small businesses' security but it's time to face the facts.
Tags : 
trend micro, security, small business, cybercrime, cloud security, email security, internet security, security management
    
Trend Micro Inc.

Second Annual Cost of Cyber Crime Study by The Ponemon Institute

Published By: Quinstreet - Infosec     Published Date: Jun 11, 2012
Results from the 2nd Annual Cost of Cyber Crime Study, clearly illustrate that despite increased awareness of the impact of cybercrime, cyber attacks continue to occur frequently resulting in serious financial consequences for business and government
Tags : 
    
Quinstreet - Infosec

Five Ways to Reduce the Risk of Cybercrime to Your Business

Published By: Kaseya     Published Date: Nov 12, 2014
While there are an innumerable number of ways you could improve your business’s information security posture, for the sake of brevity let’s shorten that list to the methods which often provide great benefits. Here are five ways that you can help your business reduce the chance of being victimized by cybercrime.
Tags : 
kaseya, cybercrime, reduce risk, cyber attacks, audits, authentication, security, automation
    
Kaseya

How Cybercriminals Make Money With Your Email

Published By: McAfee     Published Date: Nov 12, 2014
This paper discusses key issues organizations should address in the context of cybercrime carried out through email, and practical advice on what organizations should do to protect themselves.
Tags : 
osterman research, cybercriminals, cybercrime, email-based malware, spearphishing, short urls, advanced persistent threats, phishing emails
    
McAfee

Selecting the Right Cybercrime-Prevention Solution

Published By: IBM     Published Date: Aug 06, 2014
Cybercrime prevention needs to reach beyond fraud prevention. Organizations also need to consider deployment costs, management complexity, impact to customers and regulatory compliance. This document examines seven best practices for achieving effective, sustainable cybercrime prevention.
Tags : 
ibm, banking, cybercrime, prevention, solution, fraud, security
    
IBM

IBM Security Services Cyber Security Intelligence Index for Financial Services

Published By: IBM     Published Date: Nov 05, 2014
This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber security incidents.
Tags : 
ibm, security, cyber security, business intelligence, financial services, protection, secure protection, business security
    
IBM

Reputational Risk and IT in the Banking Industry

Published By: IBM     Published Date: Nov 05, 2014
How security and business continuity can shape the reputation and value of your company.
Tags : 
ibm, security, cyber security, business intelligence, financial services, protection, secure protection, business security
    
IBM

Cybersecurity Buyer's Guide

Published By: Palo Alto Networks     Published Date: Apr 25, 2017
Cyber criminals constantly innovate their threat tactics to more efficiently breach organizations and make off with valuable data. As cybercrime evolves, we see increased innovation in the hacking tools and techniques used to evade known security mechanisms. In the past few years, we have seen more advanced, targeted attacks, where hackers spent ample time investigating the target and tailoring the threat. Keeping up with new attack techniques, and effectively defending against advanced threats, is perhaps the biggest challenge facing security teams today. In a world of cyberthreats where the only constant is change, architecting a cybersecurity solution that dynamically adapts to constant change is crucial.
Tags : 
    
Palo Alto Networks

The Thriving Malware Industry: Cybercrime Made Easy

Published By: IBM     Published Date: Apr 09, 2015
The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others.
Tags : 
ibm, computer security, network security, malware protection, network security, security organization, anti spyware, firewalls
    
IBM

The thriving malware industry: Cybercrime made easy

Published By: IBM     Published Date: Jul 15, 2016
"The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cyber crime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others. "
Tags : 
cybercrime, financial fraud, best practices, finance, banking fraud, e-commerce, business management
    
IBM

The thriving malware industry: Cybercrime made easy

Published By: IBM     Published Date: Jan 07, 2016
In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad.
Tags : 
ibm, malware, industry, cybercrime, fraud, security
    
IBM

Cylance 2017 Threat Report

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance

3 Strategies to Protect Endpoints from Risky Applications

Published By: Lumension     Published Date: Aug 15, 2010
Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today's IT environment.
Tags : 
cyber security, application security, risk management, third party applications, endpoint security, cyber crime, anti virus, hacker detection
    
Lumension

Understanding Web Application Security: Defending the Enterprise's New Porous Perimeter

Published By: Akamai     Published Date: Jul 01, 2011
This white paper examines current trends in Web application security, assessing the present threat environment as well as limitations in existing approaches to protection, and then explores how a Web application firewall solution can overcome these challenges.
Tags : 
akamai, web application security, security extension, firewall solution, cyber crime, xss, ddos, sql injection
    
Akamai
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.