hack

Results 101 - 125 of 347Sort Results By: Published Date | Title | Company Name

2016 Cyber Intrusion Casebook5) CrowdStrike Cyber Intrusion Services Casebook 2016

Published By: CrowdStrike     Published Date: Feb 01, 2017
This year’s Cyber Intrusion Services Casebook focuses on in-depth digital forensics, incident response (IR) and remediation services performed on behalf of actual CrowdStrike clients. Real-life examples drawn from notable CrowdStrike Services IR engagements in 2016 — including the now-infamous hack of the Democratic National Committee (DNC) —are covered with an emphasis on best practices organizations can follow to identify and eject attackers before a devastating breach occurs. Download this report to learn: • How CrowdStrike’s Falcon OverWatch and professional services teams discovered and attributed the DNC intrusion to nation-state threat actors FANCY BEAR and COZY BEAR • The gaps in security processes and planning that your organization can address now to stop the next breach • The specific tactics, techniques and procedures (TTPs) a range of nation-state and eCrime adversaries used to penetrate their victims’ defenses, and how they attempted to cover their tracks
Tags : 
    
CrowdStrike

7 Ways to Make Yourself Hard to Hack

Published By: SolarWinds MSP     Published Date: Jan 25, 2017
Download the e-book "7 Ways to Make Yourself Hard to Hack" and read up on some great guidelines to follow as you build a layered approach to security.
Tags : 
solarwinds, msp, hackers, security, it security
    
SolarWinds MSP

Rethinking the Network as a Security Sensor and Enforcer

Published By: Cisco     Published Date: Dec 21, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security
Tags : 
    
Cisco

Rethinking the Network as a Security Sensor and Enforcer

Published By: Cisco     Published Date: Dec 21, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security.
Tags : 
    
Cisco

Anatomy of A Hack Disrupted

Published By: LogRhythm     Published Date: Dec 20, 2016
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance. In 2014, the cost of malware attacks and resulting breaches was estimated at $491 billion.i And these costs include more than just the money spent trying to directly respond to security breaches. Productivity, long-term profitability, and brand reputation are often severely impacted as well.
Tags : 
    
LogRhythm

Anatomy of a Hack Disrupted

Published By: LogRhythm     Published Date: Dec 20, 2016
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance
Tags : 
security, technology, best practices, information technology, business analytics, business management
    
LogRhythm

Hospitality Edition: What's out there threatening your network?

Published By: Cox Business     Published Date: Dec 19, 2016
As we continue to move forward into an age of big data, optimization, and greater convenience through the capabilities of better networking technologies, opportunities have never been greater to use technology to make for a truly seamless hospitality experience. However, growing dependence on your network for everything from booking to entertainment can also mean that hospitality networks hold greater amounts of data than ever before. This makes them a tempting target for hackers.
Tags : 
    
Cox Business

Healthcare Edition: What's out there threatening your network?

Published By: Cox Business     Published Date: Dec 19, 2016
As the healthcare industry continues to move forward into an age of big data, optimization, and greater coordination of care through the capabilities of better networking technologies, opportunities have never been greater to use technology to truly improve how healthcare professionals interacts with patients. However, growing dependence on your network for everything from medical records to billing information can also mean that healthcare networks hold greater amounts of data than ever before. This makes them a tempting target for hackers.
Tags : 
    
Cox Business

The Government is Getting Tough on Cyber Security...But Is your Business

Published By: Cox Business     Published Date: Dec 19, 2016
Solutions that make it easy to keep track of security and software updates will give you an edge like no other. In many cases, hackers target specific holes in outdated software. Rather than dealing with the headache of continually updating each computer in your network, use tools that track and perform system updates automatically. You’ll always be ahead of the curve.
Tags : 
    
Cox Business

Federal Government Edition: What's out there threatening your network?

Published By: Cox Business     Published Date: Dec 19, 2016
As we continue to move forward into an age of big data, optimization, and shared information through the capabilities of better networking technologies, opportunities have never been greater for using technology to improve the way the government interacts with constituents. However, increasing dependence on web and network services also makes government a tempting target for hackers. Distributed Denial of Service attacks, data breaches, leaks, the risks can be enormous. Recent events have shown us that now more than ever, government servers are getting victimized by well-funded teams of foreign hackers, possibly funded by their government.
Tags : 
    
Cox Business

Your Indirect Suppliers: When’s the Right Time for a Review?

Published By: Staples     Published Date: Nov 23, 2016
Providing your company with its indirect supplies can be a complicated, cumbersome task. But it doesn’t have to be.
Tags : 
indirect supply, procurement, indirect spend, hackett group, cost reduction, enterprise applications, business technology
    
Staples

Determining the True Costs of a Data Breach

Published By: Secureworks     Published Date: Nov 11, 2016
This paper takes an in-depth look at the true costs — both short and long term — of a data breach, and provides steps and tips that executive teams and security leaders can use to determine and reduce the true cost of a data breach.
Tags : 
managed security services, data breach, security, hackers, security, threat and vulnerability management, cost, hacker detection, vulnerability management, data loss prevention
    
Secureworks

QTS - Information, Security & Compliance Forum

Published By: QTS     Published Date: Nov 04, 2016
Watch this video to hear from American Hacker, Jeff Moss, about the security threats faced by companies today!
Tags : 
information security, security threats, data security, security, it management, data management
    
QTS

The Future Of Data Security And Privacy: Growth And Competitive Differentiation

Published By: IBM     Published Date: Sep 30, 2016
Data is the lifeblood of today’s digital businesses; protecting it from theft, misuse, and abuse is the top responsibility of every S&R leader. Hacked customer data can erase millions in profits, stolen IP can destroy competitive advantage, and unnecessary privacy abuses can bring unwanted scrutiny and fines from regulators while damaging reputations. S&R pros must take a data-centric approach that ensures security travels with the data regardless of user population, location, or even hosting model; position data security and privacy capabilities as competitive differentiators; and build a new kind of customer relationship.
Tags : 
ibm, security, data, privacy, forrester, forrester research, data management, business technology
    
IBM

Webinar - The Biggest API Security Fails - And How to Fix Them

Published By: MuleSoft     Published Date: Sep 14, 2016
This is a webinar about API security fails and how to fix them.
Tags : 
api, security fails, vulnerable, digital era, hacks, wireless, enterprise applications
    
MuleSoft

Breach Response Best Practices

Published By: LifeLock     Published Date: Sep 12, 2016
It only takes one stolen laptop, one employee’s USB stick, one hacker, one virus, or one careless error to compromise your company’s reputation and revenue. The threat of data breach is real and it’s critical that your company is prepared. A thorough plan that can be executed quickly is essential to comply with relevant regulations, maintain customer loyalty, protect your brand and get back to business as soon as possible.
Tags : 
est practices, identity theft, security, protection, authentication
    
LifeLock

Objectives: The Ultimate Productivity Hack For Your Team

Published By: Xactly     Published Date: Sep 06, 2016
This guide will not only help you understand how Xactly Objectives can help you step up your productivity game, but will also share the amazing power that incentives and objectives have to change the world, as well as fill you in on some entertaining productivity hacks from well known historical figures and regular 9-5 workers.
Tags : 
business management, productivity, management
    
Xactly

The Internet of Threats

Published By: Kaspersky     Published Date: Aug 17, 2016
Download our eBook to learn what you can expect from the oncoming wave of connected “things.”
Tags : 
kaspersky, iot, internet security, hackers, cybercrime, wireless security, network security, firewalls, hacker detection, data protection, mobile device management, data loss prevention
    
Kaspersky

Helpdesk Productivity Hacks for eCommerce Businesses

Published By: Freshdesk     Published Date: Aug 15, 2016
When 76% of consumers say they view customer service as the true test of how much a company values them, you have to make sure that your strategy, and tool, are top notch. Here's a collection of best practices, drawn from our conversations with customers, to help you improve your agents' productivity and win customer love. In this whitepaper, we detail how you can - Provide your agents with complete context by pulling data from your third party systems into your helpdesk - Reduce ticket volume and help customers help themselves by setting up a knowledge base - Automatically assign tickets to the right team with ease thus reducing your agent's workload and many more!
Tags : 
    
Freshdesk

Mobile Malware hits ActiveSync-only Devices (in Japanese)

Published By: MobileIron     Published Date: Aug 04, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron

IDC: Rethinking the Network as a Network Enforcer

Published By: Cisco     Published Date: Jul 11, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security.
Tags : 
    
Cisco

Data security: How a proactive C-suite can reduce cyber-risk for the enterprise

Published By: Oracle     Published Date: Jun 20, 2016
The number one technology issue in the C-suite today is cyber-security. And there’s no wonder—attacks are becoming more numerous and more sophisticated than ever. The cost of cyber-crime to the global economy has topped more than $445 billion2 – equivalent to 1% of global GDP. Sometimes cyber-crime can seem unstoppable – while firms spent more than $75 billion on cyber-defences in 20153 , cyber-crime grew by 38% that year. That’s why C-suite executives everywhere are asking: What can we do to make a difference in defending against hackers, cyber-criminals and digital spies?
Tags : 
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.