malicious attacks

Results 1 - 25 of 78Sort Results By: Published Date | Title | Company Name

10 Top Things to Look For in a Cloud Security Solution Provider

Published By: Akamai Technologies     Published Date: May 05, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : 
cloud security, cyberattacks, cloud service, security
    
Akamai Technologies

Targeted Threat Protection in the Cloud

Published By: Akamai Technologies     Published Date: Aug 11, 2017
Targeted threats are increasing at an alarming rate. Malicious actors are evolving their methodologies and are increasingly exploiting the domain name system (DNS) to launch cyberattacks. Learn more about how to proactively protect your company with an additional layer of cloud-based security.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies

Is DNS Your Security Achilles Heel?

Published By: Akamai Technologies     Published Date: Aug 11, 2017
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies

Application Security and Performance

Published By: Akamai Technologies     Published Date: Aug 17, 2017
Web application and DDoS attacks hit enterprises without warning or reason. The attacks can expose confidential data and website resources to malicious uses, reduce performance, and render sites unavailable. Responsible organizations proactively block web attacks to protect their reputations, site availability, site performance, and confidential data.
Tags : 
application, security, performance, web attacks, data security
    
Akamai Technologies

10 Top Things to look for in a Cloud Security Solution Provider

Published By: Akamai Technologies     Published Date: Aug 17, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : 
cloud security, cloud solutions, data analysis, cyberattacks
    
Akamai Technologies

Is DNS Your Security Achilles Heel?

Published By: Akamai Technologies     Published Date: Jun 14, 2018
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
dns< security breach, cyber security
    
Akamai Technologies

Is DNS Your Security Achilles Heel?

Published By: Akamai Technologies     Published Date: Dec 11, 2018
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
    
Akamai Technologies

Got Bots? How to Evaluate Solutions for Bot Management & Mitigation

Published By: Akamai Technologies     Published Date: Mar 19, 2019
If you have a website, you most likely have an infestation of bots. While some bots are beneficial, bots can make up a significant portion of your daily website traffic. Malicious bots bombard websites with direct and specific attack goals, such as stealing customer information, scraping content, and even initiating DDoS attacks. Our latest eBook explores the differences between good bots and bad bots, and explains the best way to manage harmful bots.
Tags : 
    
Akamai Technologies

Credential Stuffing 101: The Risk of Bots to Your Business

Published By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Credential stuffing is on the rise. Bots are getting smarter and malicious actors are getting more confident. Unfortunately, these advanced cyberattacks are also becoming more difficult to detect with standard security controls. Learn more about credential stuffing and how you can protect your business, your brand, and your customers from bots that commit fraudulent activity.
Tags : 
credential, bots, business, risk, management, security, cyberattacks
    
Akamai Technologies Australia

Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done

Published By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault

Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done

Published By: AlienVault     Published Date: Aug 13, 2015
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.
Tags : 
alienvault, security, siem, hacking, threat detection, hacker detection, internet security, intrusion detection
    
AlienVault

Implementing an effective disaster recovery strategy for your data

Published By: AWS     Published Date: Oct 12, 2018
Safeguarding your data is more important than ever. In today’s data-driven business landscape, companies are using their data to innovate, inform product improvements, and personalize services for their customers. The sheer volume of data collected for these purposes keeps growing, but the solutions available to organizations for processing and analyzing it become more efficient and intuitive every day. Reaching the right customers at the right time with the right offers has never been easier. With this newfound agility, however, comes new opportunities for vulnerability. With so much riding on the integrity of your data and the services that make it secure and available, it’s crucial to have a plan in place for unexpected events that can wipe out your physical IT environment or otherwise compromise data access. The potential for natural disasters, malicious software attacks, and other unforeseen events necessitates that companies implement a robust disaster recovery (DR) strategy to
Tags : 
    
AWS

BlackBerry Cylance 2019 Threat Report

Published By: BlackBerry Cylance     Published Date: Apr 26, 2019
In 2018, BlackBerry Cylance observed many trends in the threat landscape, such as a decline in overall ransomware attacks, an increase in malicious coinminers, and a marked evolution of popular threats like Emotet. Additionally, overall malware attacks rose by 10% as attackers continue to hone their tools, skills, and tactics to threaten Windows, macOS, and Internet of Things (IoT) platforms. Read the BlackBerry Cylance 2019 Threat Report to understand these trends in greater depth, and to learn our recommendations to improve your security strategies.
Tags : 
    
BlackBerry Cylance

BlackBerry Cylance 2019 Threat Report

Published By: BlackBerry Cylance     Published Date: Jun 24, 2019
In 2018, BlackBerry Cylance observed many trends in the threat landscape, such as a decline in overall ransomware attacks, an increase in malicious coinminers, and a marked evolution of popular threats like Emotet. Additionally, overall malware attacks rose by 10% as attackers continued to hone their tools, skills, and tactics to threaten Windows, macOS, and Internet of Things (IoT) platforms. Read the BlackBerry Cylance 2019 Threat Report to understand these trends in greater depth, and to learn our recommendations to improve your security strategies.
Tags : 
    
BlackBerry Cylance

INSIDER THREAT 2018 REPORT

Published By: CA Technologies     Published Date: Jun 01, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies

Report: Sponsored Report: 2018 Insider Threats Report

Published By: CA Technologies EMEA     Published Date: May 23, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies EMEA

Threat Hunting for Dummies

Published By: Carbon Black     Published Date: Apr 10, 2018
A dversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
Carbon Black

Threat Hunting for Dummies

Published By: Carbon Black     Published Date: Apr 11, 2018
Adversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
Carbon Black

Securing Endpoints Against The Next Generation of Attacks

Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
In today’s ‘always on, always connected’ world where sensitive data is almost certain to be stored electronically, organizations can no longer afford to operate without some form of Endpoint Protection. The costs related to network downtime or stolen data resulting from malicious attacks significantly outweighs that of maintaining an up to date solution. Although the unified nature of Endpoint Protection has made extensive security functionality easier to manage, selecting the right products can be a difficult task. This whitepaper aims to explain how the core functionality of Enterprise Protection suites have developed, what to look for in a solution, and which technologies will need to be considered in the future. In today’s business environment, it is no longer a question of whether to invest in Endpoint Protection, but a question of which solution is right for your organization.
Tags : 
endpoint security, data security, endpoint protection, enterprise protection, technology, networking, security, it management
    
CDW-Trend Micro

Anticipating the Unknowns: Chief Information Security Officer (CISO) Benchmark Study

Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA

Anticipating the Unknowns: Chief Information Security Officer (CISO) Benchmark Study

Published By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA

Solution Brief: Nothing kills attacks earlier than DNS-layer security.  

Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Attacks have many phases. Before launching, the attacker needs to stage internet infrastructure to support each phase. Two early phases are to redirect or link to a malicious web domain or send a malicious email attachment. For the former, most attacks leverage exploit kits (e.g. Angler) as the first stage before dropping the final payload. Cisco Umbrella effectively blocks initial exploit and phishing domains. Unlike appliances, our cloud security platform protects devices both on and off the corporate network. Unlike agents, the DNS layer protection extends to every device connected to the network — even IoT. Umbrella truly is the easiest and fastest layer of security to deploy everywhere. Download today to find out more.
Tags : 
    
Cisco Umbrella EMEA

Reduce the number of ransomware infections across your organization

Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
What is ransomware? Ransomware is a malicious software designed to hold a user’s files (such as healthcare records, financial contracts, manufacturing blueprints, software code, and other documents) for ransom by encrypting them and demanding the user pay a fee (often in Bitcoin) to decrypt them. How ransomware works Attackers initiate attacks using an array of tactics. Ransomware infections often first begin with an exploit kit — which are software kits designed to identify software vulnerabilities on endpoints and then upload and execute malicious code on the endpoint. Although variants of ransomware behave differently — there are many ways that Cisco can help. Download this whitepaper today to find out more.
Tags : 
    
Cisco Umbrella EMEA

How Italy’s largest service provider leverages security to drive digitalization and raise revenues

Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Organization: Telecom Italia (TIM) Headquarters: Milan, Italy Users: 600,000 Objective: As Italy’s businesses grew increasingly vulnerable to the threat of ransomware, data breaches, and other malicious malware attacks, service provider TIM sought an innovative solution to effectively and efficiently protect the network and data of its business users. Solution: Cisco Umbrella for Service Providers (SPs) Impact: • Rolled out TIM Safe Web to more than 600,000 customers, with less than 1 in 10,000 customers opting out of the service • Provided TIM with a unique competitive differentiator • Created an incremental revenue stream for TIM
Tags : 
    
Cisco Umbrella EMEA

Nothing kills attacks earlier than DNS-layer security

Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
"Nothing kills attacks earlier than DNS-layer security. Protection both before and during the attack Attacks have many phases. Before launching, the attacker needs to stage internet infrastructure to support each phase. Two early phases are to redirect or link to a malicious web domain or send a malicious email attachment. For the former, most attacks leverage exploit kits (e.g. Angler) as the first stage before dropping the final payload. Cisco Umbrella effectively blocks initial exploit and phishing domains.
Tags : 
    
Cisco Umbrella EMEA
Start   Previous   1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.