HIT Consultant Insightful coverage of healthcare innovation
 

security incidents

Results 1 - 25 of 81Sort Results By: Published Date | Title | Company Name
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
Building on the popular Threat of the Month series, Cisco researchers looked at notable 2018 cybersecurity incidents with a fresh perspective: what do they reveal about future adversary tactics? With this lens, they chose threats that best embody what defenders should expect in the year ahead. The report contains in-depth analysis, best practices, and trends to watch.
Tags : 
    
Cisco Umbrella EMEA
Published By: Nozomi     Published Date: Oct 08, 2019
Read this document to learn: NN-OT-Risks-Costs-DOCUMENT How OT cyberattacks cause business disruption The costs of high profile industrial cyber security incidents How to reduce risk with OT visibility and cyber security technology Examples of OT cyber security incidents by industry Complete the form and download the Executive Brief. You'll be on your way to improving your knowledge of the industrial security challenge!
Tags : 
    
Nozomi
Published By: Trend Micro     Published Date: Aug 13, 2019
While threat prevention continues to improve with the use of advanced techniques, adversaries are outpacing these advances requiring security teams to implement threat detection and response programs. Security teams are often addressing the process haphazardly, using disconnected point tools and manual processes that consume too many analysts and result in slow mean-time to detection and response. While EDR has enabled security teams to take important steps forward for detection and response, ultimately it can only look at the endpoints which limits the scope of threats that can be detected and if something is detected, limits the view of who and what is affected and thus, how best to respond. ESG therefore recommends looking beyond the endpoint and utilizing natively integrated security solutions across more than just one vector to improve detection and response times. The more data you can knit together, the more effective you can be to uncover the security incidents most dangerous to your organization. Watch this webinar to learn about the value of XDR: connecting detection and response across multiple security layers. Dave Gruber, senior analyst at ESG, shares recent research and his views on the evolution of threat detection and response; making the case for expanding the capabilities and expectations of detection and response solutions. Wendy Moore, VP of Product Marketing, discusses Trend Micro’s own XDR strategy and the unique value that Trend Micro can bring to detection, investigation and response.
Tags : 
    
Trend Micro
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities
    
Ounce Labs, an IBM Company
Published By: Cisco EMEA     Published Date: Mar 26, 2019
For more than a decade, Cisco's security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organisational implications. Today, Cisco is publishing its second report for 2019: Defending against today's critical threats. This white paper looks back at the threat landscape over the past year, highlighting some of the key cyber security incidents during that timeframe. However, this isn't just another retrospective report, fondly looking back at events that have already come to pass.
Tags : 
    
Cisco EMEA
Published By: Dell EMC EMEA     Published Date: Nov 23, 2018
Companies Prioritize Detection Amidst A Wave Of Security Incidents Advanced endpoint threats and steady attacks change the way that decision-makers at organizations of all sizes and across industries prioritize, purchase, and execute on security initiatives. Now more than ever, IT security professionals recognize the importance of front line detection and are shifting priorities to close gaps that place their organizations at risk. Learn more about Dell solutions powered by Intel®
Tags : 
    
Dell EMC EMEA
Published By: Limelight Network     Published Date: Aug 12, 2019
Cyber-criminals are increasingly sophisticated and targeted in their attacks. If you are in charge of ensuring the security of your company’s website, it has not been easy going as these notable security incidents reveal: • Sabre Systems—The reservation software company had data from Hard Rock Hotels, Google, Loews, and others, stolen as a result of the breach1. • CIA—WikiLeaks obtained and published documents detailing the intelligence agency’s hacking efforts1. • Virgin America—Thousands of employees and contractors had their login information compromised1. • Equifax—The credit rating agency had a breach into highly sensitive personal information of 143 million U.S. consumers1. • Universities and Federal Agencies—More than 60 universities and US federal organizations were compromised with SQL injections1. There are numerous lessons to be learned from these breaches. Despite the growing stream of news stories about highly damaging attacks that compromise customer info
Tags : 
    
Limelight Network
Published By: Absolute Software     Published Date: May 31, 2016
With companies embracing mobility to maintain competitive advantage in the digital era, information security threats have increased exponentially. Userfriendly technologies such as mobile devices, mobile apps, and cloud storage are often hacker-friendly too, creating opportunities for cybercriminals to covertly infiltrate company data. This opens the door to data loss, reputational damage, loss of proprietary information – not to mention the associated regulatory penalties and potential legal fees. IT bears the brunt of responsibility for information security, yet according to Forrester, internal incidents top the list of security breach causes in 2014.
Tags : 
mobility, competitive advantage, best practices, mobile devices, mobile applications
    
Absolute Software
Published By: Butler Technologies     Published Date: Jul 02, 2018
Increasingly complex networks, require more than a one-size-fitsall approach to ensuring adequate performance and data integrity. In addition to the garden-variety performance issues such as slow applications, increased bandwidth requirements, and lack of visibility into cloud resources, there is also the strong likelihood of a malicious attack. While many security solutions like firewalls and intrusion detection systems (IDS) work to prevent security incidents, none are 100 percent effective. However, there are proactive measures that any IT team can implement now that can help ensure that a successful breach is found quickly, effectively remediated, and that evidential data is available in the event of civil and/or criminal proceedings.
Tags : 
    
Butler Technologies
Published By: Dell PC Lifecycle     Published Date: May 18, 2018
Companies Prioritize Detection Amidst A Wave Of Security Incidents Advanced endpoint threats and steady attacks change the way that decision-makers at organizations of all sizes and across industries prioritize, purchase, and execute on security initiatives. Now more than ever, IT security professionals recognize the importance of frontline detection and are shifting priorities to close gaps that place their organizations at risk.
Tags : 
    
Dell PC Lifecycle
Published By: Nozomi     Published Date: Jul 08, 2019
Read this document to learn: NN-OT-Risks-Costs-DOCUMENT How OT cyberattacks cause business disruption The costs of high profile industrial cyber security incidents How to reduce risk with OT visibility and cyber security technology Examples of OT cyber security incidents by industry Complete the form and download the Executive Brief. You'll be on your way to improving your knowledge of the industrial security challenge!
Tags : 
    
Nozomi
Published By: IBM     Published Date: Jan 09, 2017
This report from IBM Emergency Response Services discusses four key trends in cybersecurity based on field experience in responding to client security incidents.
Tags : 
ibm, security, services operations, ibm emergency response services, cybersecurity, cyber crime
    
IBM
Published By: Splunk     Published Date: Aug 21, 2018
Alice Bluebird, a quirky security analyst for hire, is hunting down a nation state of hackers thirsty for the recipes of Frothly, a cutting-edge craft brewery. Follow Alice as she works to solve the mystery of the breach. Did she catch the incident before the hackers managed to steal Frothly’s super secret formulas? Did the hackers act alone or — scarier yet In this light hearted graphic novel “Through the Looking Glass Table”, discover how machine data, as well as an analytics-driven platform, log management, SIEM, UEBA and SOAR solutions, can help anyone — IT managers and sophisticated SOC analysts — better understand and respond to incidents, breaches, phishing attempts, insider threats and more.— did they have help from the inside?
Tags : 
    
Splunk
Published By: Splunk     Published Date: Aug 22, 2018
Gartner's “2017 Critical Capabilities for Security Information and Event Management” report assesses eight SIEM capabilities against the increasingly complex vendor landscape. The conclusion? Splunk had the highest score in the Security Monitoring use case. We believe customers rely on Splunk’s advanced security analytics capabilities to meet their SIEM and security intelligence needs — improving threat detection, investigation and time to remediation. It’s proven to help with compliance and incident reporting, automated alerting of common security events and historical analysis for detected incidents. CISOs, CIOs, and security and risk leaders should download Gartner’s annual report to make the best-informed buying decision for security and learn about Splunk’s leadership position in the market.
Tags : 
    
Splunk
Published By: Gigamon     Published Date: Jun 21, 2019
Organisations have invested heavily in cybersecurity tools and yet more than five million data records are lost or stolen every day. The problem is not that today’s cybersecurity tools are badly designed or missing features, the problem is that surging volumes of network traffic overwhelm security tools, causing administrators to use sampling or disable advanced features in order to preserve application performance. Also, security tools and IT staff don’t get all the data they need to detect and respond to outside attacks and insider incidents, because they are faced with “blind spots” in data collection. Read this business brief in local language to find out how
Tags : 
    
Gigamon
Published By: SecureAuth     Published Date: Aug 08, 2017
Office 365 has eclipsed all other cloud applications to emerge as the most widely used enterprise cloud service by user count. It’s easy to understand why: With Office 365, organizations no longer have to pay for hardware or resources to manage software in their own data centers, and their users always have the latest versions of applications. But Office 365 comes with significant security concerns, especially as organizations store more and more sensitive and business-critical data there. One study reports that virtually every organization experiences at least one cloud-based threat each month — and the average has soared to nearly 6 incidents every week. What can organizations do to protect their Office 365 environments? Read the white paper to learn.
Tags : 
    
SecureAuth
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Case study Objective: Enhance the customer experience by building automation into the security practice. Impact: • Decreased incident response time from days to minutes through automation, enabled by the Investigate API • Reduction in network security incidents and infected endpoints • Increased protection against malware, ransomware, and other threats on and off the network • Enriched security event data and threat intelligence with Investigate Download this case study today to find out the impact Cisco Umrella could have on your business.
Tags : 
    
Cisco Umbrella EMEA
Published By: Absolute Software     Published Date: Nov 21, 2011
Learn about best practices in the management and security of IT assets and the sensitive information they contain.
Tags : 
security, strategy, healthcare, absolute, it assets, sensitive information, phi, ehr
    
Absolute Software
Published By: Secureworks     Published Date: Oct 04, 2017
The SecureWorks Incident Management and Response team helps organizations of all sizes and across all industries prepare for, respond to and recover from even the most complex and large-scale security incidents. This paper is designed to help you ask tough, dir ect questions of any incident response services provider to help you determine the vendor’s capabilities, and if that vendor represents the best fit based on your organization’s particular needs. We highly recommend using the following questions when evaluating any outside assistance with your incident response function.
Tags : 
    
Secureworks
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: Qualys     Published Date: Feb 17, 2016
Automated asset inventory might not be the first thing that comes to mind when considering cutting-edge security technologies. In the context of today’s distributed enterprise, however, it’s essential. Since the apps, systems, and services your users access to conduct business are already in the cloud, it makes sense to consider looking to cloud-based technologies to keep track of them all. For the security and compliance professional, it’s critical to have access to a reliable and accurate asset inventory, especially when investigating security incidents and verifying and demonstrating compliance.
Tags : 
qualys, security technology, cloud based technology, best practices
    
Qualys
Published By: EMC Corporation     Published Date: Oct 01, 2014
Learn how by watching the RSA Security Analytics and RSA ECAT virtual on-demand event.
Tags : 
security, analytics, incidents, ecat, logs
    
EMC Corporation
Published By: EMC Corporation     Published Date: Oct 01, 2014
RSA Security Analytics 10.4 and RSA ECAT 4.0 will be revealed when you watch this on-demand event.
Tags : 
security, analytics, incidents, ecat, logs
    
EMC Corporation
Published By: ArborNetworks     Published Date: Sep 16, 2015
This paper examines the four stages of evolution as security organizations move from reactively responding to incidents to proactively identifying and hunting for threats.
Tags : 
    
ArborNetworks
Published By: Oracle     Published Date: Feb 22, 2019
Successful digital business depends on fast, reliable,and secure applications. Threats of service disruptions from performance slow downs, availability outages, or security incidents are driving IT organizations and service providers to double down on comprehensive system management solutions across infrastructure, applications, and end-user devices.
Tags : 
    
Oracle
Start   Previous   1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.