hack

Results 1 - 25 of 343Sort Results By: Published Date | Title | Company Name

Insiders are Still the Weakest Link in your Data Security Chain

Published By: Absolute Software     Published Date: May 31, 2016
With companies embracing mobility to maintain competitive advantage in the digital era, information security threats have increased exponentially. Userfriendly technologies such as mobile devices, mobile apps, and cloud storage are often hacker-friendly too, creating opportunities for cybercriminals to covertly infiltrate company data. This opens the door to data loss, reputational damage, loss of proprietary information – not to mention the associated regulatory penalties and potential legal fees. IT bears the brunt of responsibility for information security, yet according to Forrester, internal incidents top the list of security breach causes in 2014.
Tags : 
mobility, competitive advantage, best practices, mobile devices, mobile applications, mobile computing, mobile data systems, wireless application software
    
Absolute Software

Top 10 Data Security Tips to Safeguard Your Business

Published By: Absolute Software     Published Date: May 31, 2016
This is arguably the most unsettling time in history to be a CIO. The IT landscape is shifting at a rapid pace with advances in social media, mobility and big data. The proliferation of advanced robotics is just around the corner and the Internet of Things is connecting even the most mundane objects to the internet—and probably the corporate network. Back in the 1990s, most computer hackers were interested in gaining access to networks purely for kudos among their peers. Today hackers have monetized their skills and make their living from finding vulnerabilities in IT networks.
Tags : 
data, big data, security, corporate network, mobility, application security, best practices, productivity
    
Absolute Software

Wireless LAN Security: What Hackers Know That You Don't

Published By: AirDefense     Published Date: Apr 24, 2007
This document outlines how hackers are exploiting vulnerabilities in 802.11 wireless LANs and describes the widely available hacking tools. As a collection of already published risks to wireless LANs, this white paper is written to inform IT security managers of what they are up against.
Tags : 
hackers, hacker, hacker detection, intrusion prevention, wireless security, wlan, wlans, 802.11
    
AirDefense

Best Practices for Securing Your Enterprise LAN

Published By: AirTight Networks     Published Date: Nov 30, 1999
Making corporate data accessible through Wi-Fi networks means intruders and other unwanted visitors can easily access such networks if proper precautions and tools aren't used to protect them. This paper will discuss best practices in all five areas to secure the enterprise network, whether wired or wireless.
Tags : 
wireless, best practices, enterprise security, wi-fi, wireless security, network security, intrusion prevention, lan
    
AirTight Networks

How to Defend Your Perimeter from Today's Outsized Threats

Published By: Akamai     Published Date: Mar 10, 2012
This white paper assesses the current cyber-threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos
    
Akamai

Protecting Your Online Channels and Web Applications

Published By: Akamai     Published Date: Mar 10, 2012
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos
    
Akamai

Security and Frontend Performance: Breaking the Conundrum

Published By: Akamai Technologies     Published Date: May 05, 2017
Security and performance were once considered separate issues requiring very different solutions. But now that malicious hackers have discovered new and better ways to affect both aspects of a website, you need solutions that can plug security holes while enhancing frontend performance. How is that possible? In this report, we explore browser-based solutions that can beef up security and enhance end-user performance in one stroke. This report examines several techniques for dealing with third party content issues in the browser, including HSTS, iframe, and prefetch. It also dives into service workers and browser-based scripts that provide many security and performance options. Download it now and learn how you can jointly improve security and increase performance.
Tags : 
cyber security, security, web linking, performance
    
Akamai Technologies

Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done

Published By: AlienVault     Published Date: Aug 13, 2015
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.
Tags : 
alienvault, security, siem, hacking, threat detection, hacker detection, internet security, intrusion detection
    
AlienVault

Practitioner’s Guide to a Security Operations Center (SOC)

Published By: AlienVault     Published Date: Aug 13, 2015
Whether you’re part of a security team or a one-man show, this guide will teach you what data your SOC needs. Download this guide now to accelerate your evaluation of SOC tools and technology needs.
Tags : 
alienvault, security, soc, hacking, threat detection, application security, hacker detection, intrusion detection
    
AlienVault

2015 Gartner Magic Quadrant for SIEM

Published By: AlienVault     Published Date: Aug 13, 2015
The 2015 Magic Quadrant summarizes Gartner’s yearly analysis of the SIEM market and compares the positions of leading competitors like AlienVault. Get Gartner's complete analysis of each SIEM vendor, and learn what makes AlienVault a Visionary. Download the 2015 report.
Tags : 
alienvault, security, siem, hacking, threat detection, monitoring, anti virus, application security
    
AlienVault

The Hunted Becomes the Hunter

Published By: Arbor Networks     Published Date: Mar 13, 2015
As the world becomes more connected, it is no longer enough for enterprises to react once an alert indicates an attacker is inside the network. Instead, with continuous packet capture and threat feeds followed by analysis, it is now possible to hunt the attackers and locate them versus waiting for an alert.
Tags : 
arbor, arbor networks, hackers, cyberattacks, internet security, intrusion prevention, network security, anti virus
    
Arbor Networks

Hannoush Jewelers selects Astaro Security Gateway over SonicWall

Published By: Astaro     Published Date: Aug 10, 2009
Hannoush Jewelers Inc., a jewelry manufacturer and retailer, was using frame relay, a private network, but decided to cut costs by moving to VPN tunnels to connect their many stores and offices.
Tags : 
hannoush, jewelery, private network, frame relay, vpn, tunnels, hackers viruses, spam
    
Astaro

The Importance of Data Security

Published By: Asure Software     Published Date: Nov 06, 2013
The white paper will discuss in greater detail what the cost associated with audits, corporate hackers, tax issues, payroll disputes, and employee lawsuits can be. We will then explore how time management software can resolve the problem, and what the next steps to implementing this technology are.
Tags : 
data security, data storage, payroll security, payroll data, workforce management solutions, workforce management software, time and labor management
    
Asure Software

AT&T DDoS Defense with KONA Site Defender

Published By: AT&T     Published Date: Jul 28, 2015
Download this white paper to learn how AT&T DDoS Defense with KONA Site Defender service can extend protection from origin servers to edge servers for a comprehensive, multi-level approach to security.
Tags : 
at&t, ddos, ddos attack, kona site defender, origin services, security, cybersecurity, hackers
    
AT&T

Are you ready for a DDoS attack?

Published By: AT&T     Published Date: Jul 28, 2015
Read through the AT&T Top Readiness Tips below and see if you’re prepared for a DDoS attack and if not, what actions you can take today to get ready.
Tags : 
at&t, ddos, ddos attack, security, preparedness, cybersecurity, hackers
    
AT&T

AT&T Threat Manager – with Advanced Log Management

Published By: AT&T     Published Date: Jul 28, 2015
Download this white paper to learn more about AT&T Threat Manager – with Advanced Log Management, a security logging and event correlation monitoring solution for any size organization.
Tags : 
threat manager, at&t, advanced log management, security logging, event correlation monitoring, hackers, cybersecurity
    
AT&T

Securing the SaaS-Based Enterprise: Solving the Right Problems

Published By: bitglass     Published Date: Aug 19, 2014
In this Gigaom Research Webinar, we will separate the real threats from the hype, identify the most common forms of security breaches, and discuss the tools and processes businesses can put in place to minimize exposure and damage.
Tags : 
bitglass, saas, saas security, crm, microsoft, salesforce, identity theft, security breach
    
bitglass

The Definitive Guide to Pipeline Marketing

Published By: Bizible     Published Date: Jun 19, 2017
Learn how B2B marketers are moving away from vanity metrics and starting to optimize and plan for revenue with pipeline marketing. Get the comprehensive guide to get started!
Tags : 
pipeline marketing, full-funnel marketing, revenue marketing, b2b marketing, conversion tactics, growth marketing, growth hacking, demand generation
    
Bizible

DDoS Threat Advisory - April 2014

Published By: Black Lotus     Published Date: Apr 21, 2014
Newly updated for April 2014 with Q1 attack data, download the latest DDoS Threat Advisory from Black Lotus to learn about the latest threats facing your company.
Tags : 
black lotus, black lotus communications, ddos, denial of service, security threat, hackers, spam, fishing
    
Black Lotus

IDC Security Infographic

Published By: Blue Coat Systems     Published Date: Jul 18, 2013
From the Era Before security to this current era of empowerment this infographic from BlueCoat provides a timeline navigates the rise of web commerce and the rise in securities which protect us. Starting with when web commerce began to grow and hackers took notice to now when Web Security is able to empower businesses.
Tags : 
idc, security, bluecoat, web security, hackers, application security, email security, hacker detection
    
Blue Coat Systems

SecOps For Dummies

Published By: BMC     Published Date: Nov 19, 2018
In this book, you learn how SecOps can transform your organization’s security and operations teams to enable a more effective enterprise security posture.
Tags : 
bmc, bmc software, secops, security operations, cyberattacks, cyber criminals, hacking, data breach
    
BMC

Wiegand Security Compromised

Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
At the Defcon security conference on August 2007, a hacker and Defcon staffer who goes by the name Zac Franken, showed how a small homemade device he calls "Gecko", which can perform a hack on the type of access card readers used on office doors throughout the country.
Tags : 
security, security management, access control, identity management, iam, authentication, wiegand, tracking
    
Borer Data Systems Ltd.

Reducing the Risk of Data Breaches on Your Most Critical Servers: How CA Can Help

Published By: CA Technologies     Published Date: Jun 01, 2018
Challenge Businesses today must reduce the risk of security breaches to protect the valuable data within their organizations. At the same time, IT auditors are increasingly enforcing ever more stringent requirements on the business. The bottom line is that privileged accounts and privileged access are being targeted by hackers as a new attack surface and focused on by auditors who are insisting on greater controls around privileged accounts. Opportunity The right privileged access management solution provides comprehensive protection for your missioncritical servers with powerful, fine-grained controls over operating system-level access and privileged user actions. Capable of enforcing access controls on powerful native Superuser accounts—like the UNIX® and Linux® root and Microsoft® Windows® administrator—this system-level, host-based privileged access management solution controls, monitors and audits privileged user activity, improving security and simplifying audit and compliance. B
Tags : 
    
CA Technologies

Halten Sie die Tür offen für Anwender und geschlossen für Hacker

Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
Sie haben es jetzt auf wertvolle Daten abgesehen, die online oder über mobile Geräte zugänglich sind.
Tags : 
    
CA Technologies EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.