RecruitingBlogscom

Follow Us:

 

cyber attacks

Results 251 - 275 of 297Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jun 26, 2014
Cyber attacks are growing every day and become serious threats to your organization, but how do you know and understand the threats out there? Download a copy of this book, and you discover the zero-day exploits and threats used to compromise your enterprise. You also learn about a promising new technology developed by Trusteer, an IBM company, which provides effective yet transparent protection to enterprise endpoints. Start reading Stopping Zero-Day Exploits For Dummies, Trusteer Special Edition, today!
Tags : 
ibm, security, cyber security, cybercrime, cybercriminals, malware, network security, it management
    
IBM
Published By: xMatters     Published Date: Feb 04, 2015
Staying on top of cutting-edge communication trends can be the difference in saving lives during a disaster or even preserving customer loyalty by notifying people during a major business interruption. Get the complimentary report written by industry expert Dr. Steven B. Goldman and learn the important trends you need to be aware of in 2015, including: • The increase in security budgets, as well as fines and lawsuits • The continuing rise in data breaches and malicious cyber attacks • The impact of social media on crisis preparations and response • Why natural disasters may be the least of your worries • And most importantly, how to survive the robot uprising!
Tags : 
security, budgets, disaster, business interruption, social media, data breaches, customer loyalty, communication trends, knowledge management
    
xMatters
Published By: Symantec     Published Date: Nov 21, 2014
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Key Findings • The .doc file type was the most common attachment type used in spear-phishing attacks, making up more than 52.9 percent of all attachments in September. • The largest data breach reported in September actually took place in April, and resulted in the exposure of 56 million identities. • There were 600 vulnerabilities disclosed in the month of September, the highest number so far in 2014 and second-highest in the last 12 months.
Tags : 
cyber security threats, harmful business risks, malware, spam, intelligence team, security
    
Symantec
Published By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Take a deep dive into survey data and findings, learn about the evolution of cyberthreats, and find out how you can prepare for cyberattacks in 2015.
Tags : 
citrix, cyberthreat defense, report, 2015
    
Citrix Systems, Inc.
Published By: Symantec     Published Date: Jun 18, 2015
Learn how to use actionable threat intelligence to protect your digital business and see how aligning your threat intel efforts with the goals and success factors of your digital business will greatly improve your company’s organizational goals.
Tags : 
actionable threat intelligence, digital business, information security, targeted cyber-attacks, security, data management
    
Symantec
Published By: Symantec Corporation     Published Date: Jun 24, 2014
News headlines have been inundated with stories of massive personal and credit card data breaches. The rising intensity and sophisticated nature of cyber attacks has created a hostile and precarious environment for businesses charged with protecting their customers’ personal data. The lucrative business of selling credit card data on the black market has made point-of-sale (PoS) devices, PoS environments, and web kiosks a prime target for cybercriminals. Read this solution brief to learn how to protect your network and PoS terminal and web kiosk endpoints from costly multi-stage cyber attacks.
Tags : 
security, pos, data, malware, cyber attacks, point-of-sale, software development
    
Symantec Corporation
Published By: Norse     Published Date: Oct 22, 2013
As cyberattacks and fraud continue to increase in frequency and sophistication, organizations are placing a greater emphasis on cyberthreat intelligence as a way to protect against compromise, data breach, and losses from online fraud. Measuring the true value of threat intelligence has been difficult however. For the first time the Ponemon Institute has conducted a study that reveals the facts behind the impact that weak threat intelligence is having on organizations.
Tags : 
threat, cyber security, impact report, threat intelligence, it security, cyber threat, data breach, security attacks, enterprise security, exploits, live threat, business technology
    
Norse
Published By: Norse     Published Date: Oct 24, 2013
Learn how to protect your financial institution and your customers from cyber-attacks and fraud by learning about 4 technologies that can strengthen security.
Tags : 
threat, cyber security, impact report, threat intelligence, it security, cyber threat, data breach, security attacks, enterprise security, exploits, live threat, security
    
Norse
Published By: Norse     Published Date: Nov 19, 2013
Learn how your current defenses against cyber-attacks are outdated and how intelligence-based strategies will protect your organization from advanced attacks.
Tags : 
cyber criminal, cyber-attacks, advanced attacks, hackers, network, infrastructure
    
Norse
Published By: AlienVault     Published Date: Oct 20, 2017
Threat Intelligence is one of the most critical weapons we can use in cyber defense. Knowing which attackers are trying to target your organization, as well as how, why, and when gives you an advantage when trying to thwart these attacks. In today’s landscape, security researchers are a modern-day version of Sherlock Holmes. They’re constantly analyzing clues to an adversary’s motives and techniques, tracking down their ephemeral footprints amidst the chaos of our cyber community. However, these researches can also make hasty conclusions before all the facts are gathered, and dismiss the most important clues during investigations. This evaluation guide is designed to help you evaluate threat intelligence service providers, so that you can effectively put threat intelligence to work for you. You’ll learn: • The 3 characteristics to look for when evaluating threat intelligence vendors • The most important questions to ask when evaluating threat intelligence vendors and what to listen for
Tags : 
    
AlienVault
Published By: Technolytics     Published Date: Oct 05, 2007
Recently, a series of cyber attacks on the Defense Department and Defense contractors in the United States as well as the Ministry of Defense and Parliament in the U.K. have created significant cause-for-concern by computer security experts. It is imperative you read this brief and learn how we're all vulnerable and what is being done to prevent these Cyber Attacks.
Tags : 
spy ops, spy-ops, cyber attack, hacker, hackers, government, internet security, national security, network security, intrusion, intrusion detection, intrusion prevention, trojan, risk management, cyberwarfare, cyber warfare, technolytics
    
Technolytics
Published By: HP - Enterprise     Published Date: Oct 16, 2008
As the military and US government rely more heavily on custom-built applications for communications and management, they also become more vulnerable to cyber attacks. Worse, according to the Dept. of Homeland Security, the number of attacks on custom-built applications is doubling every year. Learn about critical threats, methods that military and civilian agencies can use to deal with cyber attacks and technologies that improve security for custom-built applications.
Tags : 
security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, department of homeland security, us government, military agency, civilian agency, military
    
HP - Enterprise
Published By: Focus     Published Date: Feb 09, 2011
Discover the primary vendor solutions and decision factors that must be considered when selecting a Unified Threat Management product to provide network defense.
Tags : 
    
Focus
Published By: FireEye     Published Date: Sep 11, 2012
Cyber Attacks on Government: How to Stop the APT Attacks that are Compromising Federal Agencies.
Tags : 
cyber attacks, apt attacks, federal, compromising, security, business technology
    
FireEye
Published By: FireEye     Published Date: Sep 11, 2012
Advanced Targeted Attacks: How to Protect Against the Next Generation of Cyber Attacks
Tags : 
cyber attacks, it security, targeted attacks, malware, business technology
    
FireEye
Published By: Arbor Networks     Published Date: Mar 06, 2013
Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.
Tags : 
ddos, cyber attacks, research, enterprise, mobile, cloud, security
    
Arbor Networks
Published By: Lenovo and Microsoft     Published Date: Oct 17, 2016
Is Windows 10 right for your business? Get All the Answers in This Comprehensive Guide to Windows 10. Making the decision to upgrade your OS in a multi-platform environment can be scary, and worse, risky! Put your mind at ease with this detailed guide to Windows 10 and Enterprise: Upgrade the Way You Work. You'll get details on: • All the new features • Security upgrades • Migration options Get the whitepaper now.
Tags : 
technology solutions, customer feedback, software, data security, encryption, cyberattacks
    
Lenovo and Microsoft
Published By: IBM     Published Date: Sep 06, 2013
In this IBM security report, we will take a look at the data we've gathered through our monitoring operations and the security intelligence generated by our analysts and incident response teams who interpret that data. Our aim is to help you gain important insights into the current threat landscape - with a close look at the volume of attacks, the industries most impacted , the most prevalent types of attacks and attackers, and the key factors enabling them.
Tags : 
ibm, security services, cyber security intelligence, index, security report, security attacks, security protection, business security, data security, security intelligence index, security, enterprise applications, data management, business technology
    
IBM
Published By: Symantec Corporation     Published Date: Oct 09, 2014
Hackers are taking aim at your small business website. Defend yourself—and your customers—with strong, affordable online security.
Tags : 
hackers, online security, cyberattacks, affordable, security
    
Symantec Corporation
Published By: Norse     Published Date: Apr 18, 2014
Learn about the epidemic of compromises that are taking place at healthcare organizations due to cyberattacks and see what steps your organization should take to protect against these threats.
Tags : 
health care, cyberattacks, compromised devices, norse, epidemic of compromises, protection against threats, security, it management, enterprise applications, business technology, information technology
    
Norse
Published By: Symantec     Published Date: Oct 07, 2014
The rising intensity and sophisticated nature of cyber-attacks has created a precarious environment for businesses charged with protecting their customers’ personal data. In 2012, credit card and debit card fraud resulted in losses amounting to $11.27 billion. In January 2014 alone, a single cyber-attack exposed more than 105 million identities. To steal this data, one option is to target the point at which a retailer first acquires that card data – the Point-of-Sale (PoS) system. PoS systems are increasingly being targeted by these attackers, which is why it's more important than ever to protect these devices and the systems they are connected to. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
point of sale systems, cyber-attacks, precarious environment, fraud, personal data, pos, security response, security
    
Symantec
Published By: Symantec     Published Date: Oct 07, 2014
An ongoing cyberespionage campaign against a range of targets, mainly in the energy sector, gave attackers the ability to mount sabotage operations against their victims. The attackers, known to Symantec as Dragonfly, managed to compromise a number of strategically important organizations for spying purposes and, if they had used the sabotage capabilities open to them, could have caused damage or disruption to energy supplies in affected countries. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
cyberespionage attacks, range of targets, security, spying, damage or disruption
    
Symantec
Published By: IBM     Published Date: Feb 05, 2014
An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events that occurred at 3,700 organizations around the world.
Tags : 
    
IBM
Published By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco FirePOWER 8350 v5.3. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall (NGFW) methodology v5.4 available on www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, cisco
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2018  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top