hack

Results 151 - 175 of 348Sort Results By: Published Date | Title | Company Name

Mobile Malware, The Hackers New Playground

Published By: IBM MaaS360     Published Date: Oct 08, 2015
Hacktavists have made the move to mobile. Malware, phishing and network attacks are now as likely to strike smartphones and tablets like any other system. Mobile Threat Management is now needed to stay ahead of new vectors of vicious intent.
Tags : 
ibm, fiberlink, maas360, mobile, malware, hackers, phishing, threat management, network, networking, security, wireless, business technology
    
IBM MaaS360

Safely Satisfy Your Enterprise Android Sweet Tooth

Published By: IBM MaaS360     Published Date: Oct 08, 2015
With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : 
ibm, fiberlink, maas360, android, google, enterprise, data, security, networking, wireless, enterprise applications, business technology
    
IBM MaaS360

Cisco 2015 Annual Security Report

Published By: Cisco     Published Date: Oct 08, 2015
The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming ever-weaker links in the security chain.
Tags : 
security, cisco, hacking, malware, attackers, security report, enterprise applications, wireless security
    
Cisco

5 Steps to Help Defend Your Network

Published By: Cisco     Published Date: Oct 08, 2015
This paper outlines and explains the 5 steps to help defend your network from infection, hacking and hard to detect threats.
Tags : 
network defense, hacking, detecting threats, security, network security
    
Cisco

The Hackett Group: Onboarding Suppliers to an eInvoicing Solution

Published By: Coupa Software     Published Date: Oct 05, 2015
The Hackett Group's 2015 e-invoicing poll reveals the ups and downs of e-einvoicing adoption. Benefits include a 42% reduction in the number of paper invoices and a 31% decrease in costs. But many struggle with the supplier onboarding process. This paper explores the challenges and provides recommendations for improving the process.
Tags : 
e-invoicing, hackett group, coupa, software
    
Coupa Software

Managing Vulnerabilities & Updates for Third Party Software

Published By: Secunia     Published Date: Sep 30, 2015
In 2014, the world saw an increased number of security breaches in high profile companies. We will take a look back at some of these cases, and why it’s not only the high profile companies that were breached. Plus we will show you steps you can take to prevent yourself from being hacked in 2015. We will focus on “getting back to the basics” going into detail on why complete patch management means a safer year for any organization.
Tags : 
managing vulnerability, security breaches, security threats, hack prevention, third party software, security
    
Secunia

When On- the-Job Training Is a Recipe for Disaster

Published By: Symantec     Published Date: Sep 14, 2015
In the running battle with cyberthreats, your first line of defense is your IT staff: the system and network administrators, SOC and NOC operators, incident response and forensics analysts, and application development and QA teams. Are these IT professionals ready to take on an ever-growing army of innovative, persistent cybercriminals and hackers? Probably not, if you expect them to acquire the knowledge and skills they need through self-directed study and on-the-job training. There is too much to learn, and few members of the IT staff have the time to research every new threat. And you can’t afford to suffer through APTs, breaches and data leakages just to provide “teachable moments” for IT personnel. There is another solution. Security simulation immerses IT professionals in a realistic online environment and challenges them to fill the roles of cyberattackers and cyberdefenders. It borrows from education theory and online gaming to present knowledge in ways that motivate learning a
Tags : 
on-the-job training, it professionals, cyber security services, security programs, security
    
Symantec

Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done

Published By: AlienVault     Published Date: Aug 13, 2015
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.
Tags : 
alienvault, security, siem, hacking, threat detection, hacker detection, internet security, intrusion detection, security management, vulnerability management, data loss prevention
    
AlienVault

Practitioner’s Guide to a Security Operations Center (SOC)

Published By: AlienVault     Published Date: Aug 13, 2015
Whether you’re part of a security team or a one-man show, this guide will teach you what data your SOC needs. Download this guide now to accelerate your evaluation of SOC tools and technology needs.
Tags : 
alienvault, security, soc, hacking, threat detection, application security, hacker detection, intrusion detection, intrusion prevention, security management
    
AlienVault

2015 Gartner Magic Quadrant for SIEM

Published By: AlienVault     Published Date: Aug 13, 2015
The 2015 Magic Quadrant summarizes Gartner’s yearly analysis of the SIEM market and compares the positions of leading competitors like AlienVault. Get Gartner's complete analysis of each SIEM vendor, and learn what makes AlienVault a Visionary. Download the 2015 report.
Tags : 
alienvault, security, siem, hacking, threat detection, monitoring, anti virus, application security, vulnerability management, data loss prevention
    
AlienVault

Team uses APM tool to ID attacker

Published By: Viavi Solutions     Published Date: Aug 05, 2015
The APM for Security Forensics white paper shows you how performance monitoring tools can act as a network security camera.
Tags : 
apm, security, hacking, performance monitoring, intrusion detection, intrusion prevention, web service security, vulnerability management, data loss prevention
    
Viavi Solutions

Is your performance management solution a target for attackers?

Published By: Viavi Solutions     Published Date: Aug 05, 2015
With increasingly creative exploits, it is important to stay ahead of the curve when it comes to data protection. Performance monitoring tools that do not keep pace can leave your information vulnerable.
Tags : 
apm, security, hacking, performance monitoring, anti virus, application security, hacker detection, intrusion detection, intrusion prevention
    
Viavi Solutions

AT&T DDoS Defense with KONA Site Defender

Published By: AT&T     Published Date: Jul 28, 2015
Download this white paper to learn how AT&T DDoS Defense with KONA Site Defender service can extend protection from origin servers to edge servers for a comprehensive, multi-level approach to security.
Tags : 
at&t, ddos, ddos attack, kona site defender, origin services, security, cybersecurity, hackers
    
AT&T

Are you ready for a DDoS attack?

Published By: AT&T     Published Date: Jul 28, 2015
Read through the AT&T Top Readiness Tips below and see if you’re prepared for a DDoS attack and if not, what actions you can take today to get ready.
Tags : 
at&t, ddos, ddos attack, security, preparedness, cybersecurity, hackers
    
AT&T

AT&T Threat Manager – with Advanced Log Management

Published By: AT&T     Published Date: Jul 28, 2015
Download this white paper to learn more about AT&T Threat Manager – with Advanced Log Management, a security logging and event correlation monitoring solution for any size organization.
Tags : 
threat manager, at&t, advanced log management, security logging, event correlation monitoring, hackers, cybersecurity
    
AT&T

Point of Sale Security: What Every Merchant Should Know

Published By: Revel Systems     Published Date: Jul 22, 2015
Hacking is a fact for life. Some hack for fame, some for sport, others for profit. In 2013 a group of hackers created and sold tens of thousands of dollars in gift cards after hacking Subway's point of sale. The 2013 "Holiday Hackers" have stolen data from 110 million innocent consumers and counting, damaging the reputation and bottom line of major retailers such as Target and Neiman Marcus, as well as credit card providers like JPMorgan.
Tags : 
point of sale, security for your retail shop, ipad pos, pos security
    
Revel Systems

Safely Satisfy Your Enterprise Android Sweet Tooth

Published By: IBM MaaS360     Published Date: Jul 09, 2015
Android: With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : 
google, google mobile os, android, hackers, security, emm, enterprise mobility management, networking, software development, it management, wireless
    
IBM MaaS360

Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization

Published By: Mimecast     Published Date: Jun 24, 2015
The article is a helpful reminder that your employees often make life easier for attackers by being the weakest link in your network defenses. Social media is a rich hunting ground for hackers. Names, locations, photos, interests, connections, partnerships, vacation details, email addresses and phone numbers – this is often the information that hackers use to target specific employees through well-crafted, highly personalized emails.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management, knowledge management, data management
    
Mimecast

Unlock the Key to Repel Ransomware

Published By: Kaspersky     Published Date: Jun 15, 2015
Download Kaspersky Lab’s Unlock the Key to Repel Ransomware to learn common ransomware scenarios and delivery mechanisms.
Tags : 
kaspersky, ransomware, cybercrime, cyberattack, hackers, data leakage, spam, malware, ransom, network security, small business networks, hacker detection, intrusion prevention, phishing, data protection, vulnerability management, business technology
    
Kaspersky

2015 State of the Endpoint Report: User-Centric Risk

Published By: Lumension     Published Date: Jun 05, 2015
Well-funded hackers with sophisticated tools made headlines and worried organizational leadership throughout 2014 yet the primary reason endpoint security risk has become more difficult in the past 24 months is due to negligent or careless employees who do not follow security policies says IT in the 2015 State of the Endpoint study by Ponemon Institute and commissioned by Lumension, a global leader in endpoint management and security. Learn more about the risks.
Tags : 
report, servers, cloud, applications, it network, business intelligence, productivity, cloud computing
    
Lumension

2015 State of the Endpoint Report: User-Centric Risk

Published By: Lumension     Published Date: Jun 03, 2015
Well-funded hackers with sophisticated tools made headlines and worried organizational leadership throughout 2014 yet the primary reason endpoint security risk has become more difficult in the past 24 months is due to negligent or careless employees who do not follow security policies says IT in the 2015 State of the Endpoint study by Ponemon Institute and commissioned by Lumension, a global leader in endpoint management and security. Learn more about the risks.
Tags : 
report, servers, cloud, applications, it network, business intelligence, productivity, business technology, cloud computing, infrastructure management
    
Lumension

Service-Based Masking: Critical to Data Loss Prevention and Threat Reduction

Published By: Delphix     Published Date: May 28, 2015
Over the past several years data loss and data leaks have been a regular part of headline news. From high-profile hacks of retailers such as Target and Home Depot to inadvertent email data leaks from large multi-national banks to targeted leaks of sensitive government documents, it is becoming clear throughout the private and public sector that data security or the lack thereof is an existential threat to business operations. While there are many vendors focused on data encryption, data masking is actually the single most effective mechanism for an IT organization to dramatically reduce or even eliminate the risk of data loss.
Tags : 
    
Delphix

Hacktivists, Hacker or Cybercriminal? Does it really matter?

Published By: ThreatTrack Security     Published Date: May 21, 2015
This presentation will look at the various motivations of attackers, explore why they don’t matter at the time of attack and focus on mitigation tactics as a way to best defend your organization.
Tags : 
threattrack, cyber security, attacks, protection, security
    
ThreatTrack Security

Endpoint Security: Fighting Cyber Crime with Automated, Centralized Management

Published By: Kaseya     Published Date: May 13, 2015
To win the ongoing war against hackers and cyber criminals, IT professionals must do two things: Deploy and maintain endpoint security tools with the latest updates, and ensure the software applications running in their networks have the latest available patches.
Tags : 
kaseya, hybrid, cloud, management, msp, mobile, big data, security, anti spyware, application security, authentication, compliance, encryption, hacker detection, identity management, internet security, intrusion detection, intrusion prevention
    
Kaseya
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.