HIT Consultant Insightful coverage of healthcare innovation
 

threat landscape

Results 176 - 194 of 194Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Sep 06, 2013
In this IBM security report, we will take a look at the data we've gathered through our monitoring operations and the security intelligence generated by our analysts and incident response teams who interpret that data. Our aim is to help you gain important insights into the current threat landscape - with a close look at the volume of attacks, the industries most impacted , the most prevalent types of attacks and attackers, and the key factors enabling them.
Tags : 
ibm, security services, cyber security intelligence, index, security report, security attacks, security protection, business security
    
IBM
Published By: IBM     Published Date: Sep 06, 2013
An Assessment Of The Current Security Landscape And How to Overcome It -- Technical information security skills are in higher demand today than ever before. As IT environments become more complex and the threat landscape grows more malicious , organizations need skilled technical staff to meet increasing security and compliance demands. Read this white paper and learn how to survive the technical security skills crisis.
Tags : 
forrester, ibm, security risks, educated staff, it environments, attack protection, attack prevention, compliance demands
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber security incidents.
Tags : 
ibm, banking, security, cyber security, financial, insights
    
IBM
Published By: Lumension     Published Date: Jun 03, 2015
The IT news over the last year has been filled with story after story on data breaches, making the release of Lumensions’ 4th annual data protection maturity report all the more relevant. Review this report for a timely analysis of the threats, responses, policies, and technologies comprising today’s shifting data security landscape. It also reveals how organizations have made progress, the steps they plan to take to address data protection challenges in 2015—and where they may still be at risk.
Tags : 
data protection, data, security, cloud, storage
    
Lumension
Published By: Cyveillance     Published Date: Jun 20, 2014
Learn about the recent trends and the 2014 outlook for the mobile security threat landscape. Find out how your organization can better prepare to prevent threats that could disrupt your business.
Tags : 
cyveillance, mobile security, cyberattacks, threats, malicious attacks
    
Cyveillance
Published By: McAfee     Published Date: Jan 20, 2015
Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet
    
McAfee
Published By: Intel Security     Published Date: Oct 20, 2015
This white paper offers three options for Windows Server 2003 migration, along with a variety of measures you can take that will help you maintain a strong security posture in the face of today’s dynamic threat landscape.
Tags : 
windows server 2003, w2k3, microsoft eol, microsoft eos, server security, server protection, data center
    
Intel Security
Published By: ArborNetworks     Published Date: Feb 12, 2016
Ask any cybersecurity professional and she’ll tell you that her job is getting increasingly difficult. Why? Most will point to a combination of the dangerous threat landscape, IT complexity, and their overwhelming workload. These issues are driving a major transition in enterprise security. Large organizations must move beyond a threat prevention mentality to become proactive cyber-¬-attack “hunters” that constantly monitor their networks for signs of trouble. This shift to proactive hunting will require new technologies that collect, process, and analyze massive amounts of security data, offer intelligent security analytics for real-¬-time incident detection, integrate threat intelligence to align suspicious internal activities with external threats, and provide analysts with the right data analytics features to query and manipulate data for historical investigations.
Tags : 
arbor networks, enterprise, cyber attack, network, data
    
ArborNetworks
Published By: IBM     Published Date: Jan 07, 2016
This white paper discusses why traditional approaches to protecting corporate credentials no longer work in today’s threat landscape and what steps CISOs must take to prevent credentials theft.
Tags : 
ibm, credentials, threat, data, analysis
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
"Title/Main headline: IBM X-Force Threat Intelligence Quarterly - 4Q 2015 Sub Headline: How can your organization better prepare for a security incident? Blurb: 2015 has been a challenging year as insider threats, malware, and stealthy and mutating attacks have affected the threat landscape. Read the latest security research from IBM X-Force to learn: How low-level attacks can mask stealthier infiltrations The benefits of regularly maintained security procedures and response plans When patterns of irregularities can be the first indicators of compromise Call to Action/Action Statement: ""Download Now"" as the action statement"
Tags : 
ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management
    
IBM
Published By: Citrix ShareFile     Published Date: Oct 04, 2019
The Definitive Guide to Selecting the Right ADC for the Digital Transformation Era In this eBook, you’ll learn how adopting the right ADC equips you to embrace change—from deploying the latest microservice apps to guarding against emerging security threats. To guide you toward the right ADC for your needs, this eBook will show you: • Digital transformation’s impact on the ADC landscape • Why your ADC should be software-based for better flexibility • How a modern ADC protects against security threats
Tags : 
    
Citrix ShareFile
Published By: Q2 eBanking     Published Date: Jul 30, 2017
Each year we examine trends in fraud reported to Q2 by our partner institutions, and every year we continue to see online banking fraud attempts in great frequency. While we may see patterns emerge or spikes in new trending behavior, the foundation of an effective defense remains consistent. Examining trends in online banking and cybercrime is crucial to navigating the current threat landscape, as is maintaining a solid defense-indepth security foundation.
Tags : 
    
Q2 eBanking
Published By: Forcepoint     Published Date: Jul 30, 2019
Financial institutions are facing increasing network security challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn about: Senior IT executives’ perspectives on the current network security landscape Forcepoint NGFW’s centrally managed solution combining enterprise-grade SD-WAN and network security Success stories from companies like Sword Apak, Avency, and Carglass
Tags : 
    
Forcepoint
Published By: IBM     Published Date: Jul 02, 2018
In today’s threat landscape, organizations need to consider a new security paradigm - one with data at the center.
Tags : 
    
IBM
Published By: DigiCert     Published Date: Jun 19, 2018
No organization is safe from cyber attacks. Organized crime drives the rapid growth and sophisticated evolution of advanced threats that put your entire website ecosystem at risk. And the threat landscape will only grow more dangerous as attackers create more innovative and damaging ways to profit from their efforts. That’s why you need Complete Website Security to harmonize and fortify your website security. Across the board, we deliver best-in-class solutions for securing your website environment. Secure your websites. Protect your business.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Jun 19, 2018
Protect your business, brand and customers in a constantly evolving threat landscape. As market and business needs evolve, and the technological arms race between cybercriminals and the security industry continues, the boundaries of website and web security are shifting. This paper explores the opportunities, risks and challenges, associated with this rapidly evolving landscape both from a business and technical standpoint, and lays out key guidelines for building an effective security strategy for the future.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Jun 19, 2018
Code signing essentially relies on a Public Key Infrastructure, which means code signing certificates are made out of a pair of public and private key - the public key is signed by a trusted Certificate Authority such as DigiCert, and the private key is kept by the owner and used to sign the code to secure. Although the technology behind code signing certificates is proven, managing them - and by extension managing the private keys - is an activity that can be very complex, especially when the key owner(s) do not understand their value. In order to help customers to solve for the shortcomings in regard to the management of code signing private keys and user access, DigiCert has developed Secure App Service. Download this whitepaper to find out more about how this can help your business.
Tags : 
    
DigiCert
Published By: Lenovo and Intel     Published Date: Sep 10, 2019
In today’s rapidly changing security landscape, you simply can’t afford to let your guard down. Studies show that a staggering 4.5 billion records were compromised in the first half of 2018.The total cost of a single data breach is now $3.86 million. Meanwhile, the stealth of recent attacks has increased the time it takes to contain a breach—69 days, on average. To investigate how enterprises are responding to these proliferating threats, Lenovo commissioned a global survey of IT decision makers. The following research looks inside the volatile security landscape and shows us why keeping PCs secure today is harder than ever before.
Tags : 
    
Lenovo and Intel
Published By: Darktrace     Published Date: Jun 21, 2019
As a prominent US credit union, TruWest was faced with a number of challenges when securing its network and critical digital assets against cyber attackers. With the threat landscape evolving rapidly, and the cost of breaches rising, TruWest security chief, Chris Sprague, discusses how Darktrace gave his team a new way of approaching cyber security.
Tags : 
    
Darktrace
Start   Previous    1 2 3 4 5 6 7 8     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.