hack

Results 176 - 200 of 348Sort Results By: Published Date | Title | Company Name

Mobile Threat Detection Through Machine Learning

Published By: MobileIron     Published Date: May 07, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, ransomware, confidential, networks
    
MobileIron

Mobile Threat Detection Through Machine Learning

Published By: MobileIron     Published Date: Aug 20, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, learning
    
MobileIron

Navigating the Threat Landscape: A Practical Guide

Published By: Kaspersky     Published Date: Jan 22, 2016
Hardly a day goes by without the discovery of a new cyber threat somewhere in the world! But how do you keep up with new malware and evolving cybercriminal tricks?
Tags : 
kaspersky, cybercrime, hackers, malware, threat protection, network security, firewalls, hacker detection
    
Kaspersky

New Demands and Requirements for Tape Encryption

Published By: Spectra Logic     Published Date: Aug 21, 2009
Most companies continue to turn their backs on backup encryption because they think it will lead to new costs, performance problems, and recovery headaches. Read why ESG believes things are about to change to radically upset the backup encryption status quo and why Spectra Logic's recent entry into backup encryption is worth noting.
Tags : 
encryption, data encryption, backup, esg, backup encryption, data security, hackers, tape backup
    
Spectra Logic

NGFW Requirements for SMBs and Distributed Enterprises

Published By: Cisco     Published Date: Feb 16, 2016
The need for threat-focused next-generation firewalls (NGFWs) that can effectively mitigate risks that traditional unified threat management (UTM) and point solutions cannot is highlighted by numerous studies, including one from Cisco that reported that every organization should assume it has been hacked. Cisco threat researchers found malicious traffic was visible on 100 percent of the corporate networks that they observed, with evidence that adversaries had often penetrated those networks and were frequently operating undetected over a long period.
Tags : 
network security, threat management, network management, security, productivity
    
Cisco

Not All Certificate Authorities Are Created Equal (DE)

Published By: Symantec     Published Date: Nov 30, 2015
Im Jahr 2011 gab es eine Reihe erfolgreicher Angriffe auf Zertifizierungsstellen und die Bedrohung wird auch in Zukunft sicher nicht nachlassen. Ganz im Gegenteil, Hacker werden immer professioneller und verwenden für ihre Angriffe auf Netzwerke immer raffiniertere Techniken
Tags : 
    
Symantec

Not all Certificate Authorities are Created Equal (ES)

Published By: Symantec     Published Date: Nov 30, 2015
A lo largo del pasado año, muchas autoridades de certificación (CA) han sido víctimas de intrusiones en sus sistemas. Por desgracia, esta amenaza no va a remitir en el futuro; al contrario,los hackers han elevado el listón de sus fechorías, y las técnicas que utilizan para infiltrarse en redes ajenas son cada vez más sofisticadas.
Tags : 
    
Symantec

Not all Certificate Authorities are Created Equal (FR)

Published By: Symantec     Published Date: Nov 30, 2015
Prises pour cible à plusieurs reprises en 2011, certaines autorités de certification (AC) ne sont pas sorties indemnes de ces attaques. En tout état de cause, il ne faut certainement pas s’attendre à une accalmie sur ce front. Bien au contraire. Les hackers ne cessent de hausser leur niveau de jeu pour perfectionner leurs techniques d’exploitation des failles réseaux.
Tags : 
    
Symantec

Not all Certificate Authorities are Created Equal (IT)

Published By: Symantec     Published Date: Nov 30, 2015
Nell’anno appena trascorso si è assisto a una serie di attacchi riusciti contro alcune autorità di certificazione (CA) e il livello di allarme non sembra destinato a diminuire. Gli hacker diventano sempre più ingegnosi e le tecniche utilizzate per violare le reti sempre più sofisticate
Tags : 
    
Symantec

Objectives: The Ultimate Productivity Hack For Your Team

Published By: Xactly     Published Date: Sep 06, 2016
This guide will not only help you understand how Xactly Objectives can help you step up your productivity game, but will also share the amazing power that incentives and objectives have to change the world, as well as fill you in on some entertaining productivity hacks from well known historical figures and regular 9-5 workers.
Tags : 
business management, productivity, management
    
Xactly

Old PCs Put Your Business at Risk

Published By: Dell     Published Date: May 07, 2015
Protect against hackers by upgrading to new desktops featuring Intel’s hardware-enhanced security and supporting software. Innovative hardware enhancements, built into Intel®-powered desktops since mid-2013, “harden” key information and commands normally executed in software, giving your business maximum protection. Read this paper to learn what your organization can do to overcome security challenges.
Tags : 
    
Dell

Onboarding Suppliers to an E-Invoicing Solution

Published By: Coupa     Published Date: Mar 07, 2016
The Hackett Group's 2015 e-invoicing poll reveals the ups and downs of e-einvoicing adoption. Benefits include a 42% reduction in the number of paper invoices and a 31% decrease in costs. But many struggle with the supplier onboarding process. This paper explores the challenges and provides recommendations for improving the process.
Tags : 
    
Coupa

Osterman Research: Why Your Organization Needs to Implement DLP

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Data breaches can carry very serious consequences, such as the revelation in February 2008 that that the Hannaford Brothers chain of supermarkets lost more than four million debit and credit card numbers to hackers. The bottom line is that organizations must implement Data Loss Prevention (DLP) systems to protect themselves against the growing array of threats they face from inadvertent and malicious data leaks from email, instant messaging and other systems.
Tags : 
trend micro, data breach, dlp, credit cards, breaches, data breaches, data loss prevention, dlp
    
Trend Micro, Inc.

Panda Security for Business with TruPrevent Technologies

Published By: Panda Security     Published Date: Feb 06, 2008
Today’s targeted malware attacks are infecting unsuspecting businesses at astonishing rates, rendering traditional antivirus solutions ineffective. Reported and known viruses are becoming less important compared to the increase in unknown threats and attacks.
Tags : 
security, threats, ips, intrusion prevention, internet security, hackers, hacker, virus
    
Panda Security

Paradigm Shifts: Trend Micro Security Predictions for 2018

Published By: Trend Micro     Published Date: May 03, 2018
Skills and resources — these are the two elements that make up an attacker’s arsenal. An attacker, however, cannot set out to break security or even perform sophisticated attacks without finding weak points in a system first. Massive malware attacks, email-borne heists, hacked devices, and disrupted services — all of these require a vulnerability in the network, whether in the form of technology or people, in order to be pulled off. Trend Micro has looked into the current and emerging threats, as well as the security approaches tailored for the landscape. Read on to find out how to make informed decisions with regard to the security focus areas that will figure prominently in 2018.
Tags : 
    
Trend Micro

Passing PCI Compliance Section 6.6: Code Reviews and Application Firewalls

Published By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
HP - Enterprise

PCI DSS Compliance: A Baseline for Security Best Practices

Published By: CDW     Published Date: Nov 13, 2012
The standard can help organizations improve handling of personally identifiable information.
Tags : 
cdw, pci, dss, compliance, cybersecurity attack, hacker attacks, verizon, pos
    
CDW

PDF Spam: A Step Ahead of Image Spam

Published By: GFI     Published Date: Jul 24, 2007
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. The latest tactic is to use the common PDF file format to send image spam. By using PDF attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : 
adobe, adobe acrobat, acrobat, gfi, spam, image spam, pdf spam, anti-spam
    
GFI

Penetration Testing: Clarifying a Commonly Misunderstood Security Discipline

Published By: NetSpi     Published Date: Sep 20, 2019
All organizations should aspire to have the people, processes, and tools necessary to effectively execute an on-going penetration testing program. Failure to do so may result in poor tool selections, testing mistakes, and faulty interpretation of results that often lead to a false sense of security putting the enterprise at risk. IT security and audit staff, along with their managers and directors, should read this paper to clarify and misunderstandings about penetrating testing - from the true purposes and goals, to important process considerations, to tools and tester selection issues, and finally to safe and effective ethical hacking approaches.
Tags : 
    
NetSpi

Penetration Testing: Clarifying a Commonly Misunderstood Security Discipline

Published By: NetSpi     Published Date: Oct 01, 2019
All organizations should aspire to have the people, processes, and tools necessary to effectively execute an on-going penetration testing program. Failure to do so may result in poor tool selections, testing mistakes, and faulty interpretation of results that often lead to a false sense of security putting the enterprise at risk. IT security and audit staff, along with their managers and directors, should read this paper to clarify any misunderstandings about penetrating testing - from the true purposes and goals, to important process considerations, to tools and tester selection issues, and finally to safe and effective ethical hacking approaches.
Tags : 
    
NetSpi

Phishing Tactics

Published By: Symantec     Published Date: Dec 04, 2014
As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years.
Tags : 
phishing, cyber crime, internet fraud, phishing schemes, hacker, fraud alert, phishing kits, security
    
Symantec

Point of Sale Security: What Every Merchant Should Know

Published By: Revel Systems     Published Date: Jul 22, 2015
Hacking is a fact for life. Some hack for fame, some for sport, others for profit. In 2013 a group of hackers created and sold tens of thousands of dollars in gift cards after hacking Subway's point of sale. The 2013 "Holiday Hackers" have stolen data from 110 million innocent consumers and counting, damaging the reputation and bottom line of major retailers such as Target and Neiman Marcus, as well as credit card providers like JPMorgan.
Tags : 
point of sale, security for your retail shop, ipad pos, pos security
    
Revel Systems

PowerTest® Strategy: How to find a control fast

Published By: Hacker Group, Inc.     Published Date: Jan 27, 2012
The objective of direct response testing is to develop a campaign control (medium, offer, creative approach and more). This unique multivariate testing approach shows how to find a winning marketing strategy as quickly as possible.
Tags : 
direct mail, direct marketing, multivariate testing, calculate roi, calculating return on investment, calculating roi, split testing, a/b test
    
Hacker Group, Inc.

Practitioner’s Guide to a Security Operations Center (SOC)

Published By: AlienVault     Published Date: Aug 13, 2015
Whether you’re part of a security team or a one-man show, this guide will teach you what data your SOC needs. Download this guide now to accelerate your evaluation of SOC tools and technology needs.
Tags : 
alienvault, security, soc, hacking, threat detection, application security, hacker detection, intrusion detection
    
AlienVault

Prepare to Respond to Disaster: Leverage IT Process Automation for Disaster Recovery Planning

Published By: HP     Published Date: Mar 31, 2015
No business is immune to the threat of IT downtime caused by natural and manmade disasters. Natural disasters—such as earthquakes, tsunamis, hurricanes, fires, and floods—can happen with little to no advanced warning. But the bigger risk is often human-induced events—from simple IT configuration errors to significant data center problems. If you lack a rock-solid disaster recovery (DR) plan, any of these unpredictable events—natural or manmade—could bring your business and its revenue streams to a halt. Yet many organizations are not well prepared for the unknown. The randomness of such events lulls people into a sense of false security—“That’s not likely to happen here.” While you can hope to avoid events that threaten the continuity of your business, the reality remains unchanged: Disasters happen—so you need to prepare for them. Are you prepared? Please download this eBook to find out!
Tags : 
disaster recovery, natural disasters, data center, hackers, hardware failure, software failure, planning, disaster readiness
    
HP
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.