cyberattack

Results 1 - 25 of 177Sort Results By: Published Date | Title | Company Name
Published By: Vmware     Published Date: Jul 01, 2020
Because current approaches to fighting cyberattacks are only incrementally improving results, it's time to examine intrinsic security—what it is, how it works, and its impact on the enterprise's business goals.?
Tags : 
    
Vmware
Published By: Vmware     Published Date: Jun 29, 2020
Understanding cybersecurity comes down to understanding attacker behaviors. In this 2020 Cybersecurity Outlook Report, we use key data from cyberattacks seen over the last year to tell a clear story on how attackers are evolving and what defenders are (and should be) doing to evolve their own behaviors.
Tags : 
    
Vmware
Published By: DeepInstinct     Published Date: Jun 12, 2020
Since 2016 over 1,000 school districts, colleges, and universities have experienced a successful cyberattack, and that number is on the rise. With such a diverse user base with varying levels of cybersecurity awareness, IT and security teams need solutions that prevent attacks with little to no human expertise required.
Tags : 
    
DeepInstinct
Published By: BlackBerry     Published Date: Jun 01, 2020
There are now more mobile devices in the world?—?over 7 billion?—?than there are people. But the explosion of mobile devices has also spawned a parallel, more insidious, phenomenon: the rise of mobile malware and cyberattacks Enterprises are confronting a tough challenge: the growing threat of malware attacks aimed at mobile devices, and especially the apps that run on them. According to Aberdeen, the most effective mobile security solutions should incorporate the principle of “zero trust”. While there are many mobile threat solutions on the market, CylancePROTECT delivers a uniquely powerful set of capabilities. Download this report to see how CylancePROTECT can work for you.
Tags : 
    
BlackBerry
Published By: Menlo Security     Published Date: Apr 30, 2020
Credential Phishing—Uniquely Targeting Individuals with Access to Valuable Data and Systems. The most notorious credential phishing campaign was the attack on John Podesta, the chairman of the Hillary Clinton presidential campaign during the 2016 election. But while many know about this attack, few understand what and how it happened. Credential phishing is a rapidly growing form of cyberattack and security professionals need to better understand these increasingly common and destructive forms of cyberattacks. This whitepaper examines: • What is credential phishing? • What are the risks to my organisation? • What can I do to stop them?
Tags : 
    
Menlo Security
Published By: Menlo Security     Published Date: Apr 30, 2020
The Japan Pension Service experienced a massive cyberattack in 2015 when an employee unknowingly opened a virus-laced email attachment. The attackers were able to steal the data of 1.25 million people, the largest successful attack in Japan. After the attack, the Ministry of Internal Affairs and Communication created the Internet Isolation Guideline for businesses. Read how the largest corporation in Japan achieves 100% malware protection without impacting end-user experience or convenience.
Tags : 
    
Menlo Security
Published By: Carbon Black     Published Date: Apr 20, 2020
The majority of today’s cyberattacks feature advanced tactics such as lateral movement and island hopping that target legitimate tools to inflict damage. These sophisticated hacking methods pose a tremendous risk to targets with decentralized systems protecting high-value assets, including money, intellectual property and state secrets. VMware Carbon Black Cloud™ thwarts attacks by making it easier to: Analyze billions of system events to understand what is normal in your environment . Prevent attackers from abusing legitimate tools. Automate your investigation workflow to respond efficiently. To learn more download this report today.
Tags : 
    
Carbon Black
Published By: Red Hat     Published Date: Apr 13, 2020
Learn how healthcare payers can protect their electronic data from cyberattacks with automated management, measurement, and compliance.
Tags : 
    
Red Hat
Published By: Cisco Umbrella EMEA     Published Date: Mar 18, 2020
Today’s workplaces are changing. Your users are getting work done on and off the network, and using more SaaS apps, which makes them increasingly vulnerable to attacks. Has your security kept up with the changing times? In this webinar, you’ll hear about the latest security research and learn how to keep your users safe, no matter where they work. Enterprise Strategy Group partnered with Cisco to analyze and validate the latest trends in the security market, including customer perceptions and consumption patterns. ESG Security Analyst, Jon Oltsik, and Cisco Product expert, Negisa Taymourian discuss the latest insights on the state of cybersecurity. This research reveals a fundamentally new approach to how organizations can keep roaming users and branch office (ROBO) locations secure from malicious threats.
Tags : 
    
Cisco Umbrella EMEA
Published By: Vmware     Published Date: Mar 13, 2020
CIO Essential Guidance for Intrinsic Cybersecurity: Because current approaches to fighting cyberattacks are only incrementally improving results, it's time to examine intrinsic security—what it is, how it works, and its impact on the enterprise's business goals.
Tags : 
    
Vmware
Published By: VMware     Published Date: Mar 12, 2020
Because current approaches to fighting cyberattacks are only incrementally improving results, it's time to examine intrinsic security — what it is, how it works, and its impact on the enterprise's business goals.
Tags : 
    
VMware
Published By: Secure Code Warrior     Published Date: Mar 11, 2020
"Secure Code Warrior's Director of the Americas, Stephen Allor, hosts a webinar with Russ Wolfe of Capital One, in which they discuss the cybersecurity landscape in the BFSI sector. They reveal why financial institutions are the new innovators when it comes to rolling out new initiatives, tools and training in the fight against cyberattacks, and how other organisations can look to them as aspirational examples for secure coding excellence."
Tags : 
    
Secure Code Warrior
Published By: MalwareBytes EMEA     Published Date: Feb 24, 2020
The new digitally transformed workplace consists of employees that expect to get their work done anywhere. This mix of onsite and remote workers, as well as the explosion of devices and applications they now use, presents a massive security challenge for businesses. What do security managers need to know now about defending against today’s cyberattacks
Tags : 
    
MalwareBytes EMEA
Published By: CrowdStrike     Published Date: Feb 21, 2020
Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it. One advanced threat technique that is experiencing success is the use of fileless attacks, where no executable file is written to disk. The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware-free, so there’s no indication that these attacks will be subsiding anytime soon. Read this white paper to get the important information you need to successfully defend your company against stealthy fileless attacks. Download this white paper to learn: • The detailed anatomy of a fileless intrusion, including the initial compromise, gaining command and control, escalating privileges and establishing persistence • How fileless attacks exploit trusted systems — the types of processe
Tags : 
    
CrowdStrike
Published By: HP Inc.     Published Date: Feb 04, 2020
The Cybersecurity landscape is constantly changing and expanding. Businesses are increasingly having to confront cyberattacks that threaten their information—and their customers’ private data. This guide is designed to help those small and medium-sized businesses with limited IT resources to strengthen their cybersecurity today, with little to no cost.
Tags : 
    
HP Inc.
Published By: FM Global     Published Date: Jan 02, 2020
Cyberattacks are expensive and prevalent. The average cost of a cyber-data breach rose to US$7.5 million in 2018, according to the U.S. Securities and Exchange Commission. Since it's your job to understand and quantify the financial risk of a cyberattack – in fact, it's the number-one thing you must know – we’ll help you break it down in this white paper. Let’s begin with three truths for 21st-century CFOs: Your company will likely be attacked. If an attack is successful, the total financial loss could outstrip even the best insurance. The cost of major security improvements pales next to the potential total financial loss.
Tags : 
    
FM Global
Published By: Vmware     Published Date: Dec 13, 2019
Because current approaches to fighting cyberattacks are only incrementally improving results, it's time to examine intrinsic security—what it is, how it works, and its impact on the enterprise's business goals.
Tags : 
    
Vmware
Published By: MalwareBytes EMEA     Published Date: Nov 20, 2019
Digital transformation makes today’s businesses more productive and more vulnerable to cyberattacks. Security professionals know that breaches are inevitable. To be successful, companies must establish cyber-resilient endpoints. Where do you turn when legacy approaches fail? In a word: Automation.
Tags : 
cyberattacks, automation, security breaches
    
MalwareBytes EMEA
Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
Traditional threat intelligence is reactive, basing security on information gathered only after an attack is successfully carried out. With threats increasing in sophistication and speed, you need intelligence that can learn from internet activity patterns, automatically identify attacker infrastructure being staged for the next threat, and block those threats before they have the chance to attack your organization. Download this white paper to learn how a predictive intelligence can aid in the fight against cyberattacks.
Tags : 
    
Cisco Umbrella EMEA
Published By: AWS     Published Date: Oct 09, 2019
Cyberattacks and undetected threats present constant risks to the safety of critical data and applications. CrowdStrike can help you overcome that risk with unified endpoint protection and real-time monitoring. This solution helps your organization gain visibility across your entire AWS environment and automatically detect and mitigate threats before they impact your business. Register now to learn how CrowdStrike has helped Oak Hill Advisors (OHA), a global investment firm, secure the assets in their AWS environment by immediately assessing issues and automating their incident responses.
Tags : 
    
AWS
Published By: Nozomi     Published Date: Oct 08, 2019
Read this document to learn: NN-OT-Risks-Costs-DOCUMENT How OT cyberattacks cause business disruption The costs of high profile industrial cyber security incidents How to reduce risk with OT visibility and cyber security technology Examples of OT cyber security incidents by industry Complete the form and download the Executive Brief. You'll be on your way to improving your knowledge of the industrial security challenge!
Tags : 
    
Nozomi
Published By: AWS     Published Date: Oct 07, 2019
Cyberattacks and undetected threats present constant risks to the safety of critical data and applications. CrowdStrike can help you overcome that risk with unified endpoint protection and real-time monitoring. This solution helps your organization gain visibility across your entire AWS environment and automatically detect and mitigate threats before they impact your business. Register now to learn how CrowdStrike has helped Oak Hill Advisors (OHA), a global investment firm, secure the assets in their AWS environment by immediately assessing issues and automating their incident responses.
Tags : 
    
AWS
Published By: Pine Cove Consulting     Published Date: Oct 03, 2019
Organizations are struggling to stop cyberattacks. Time for a different approach? Check out this infographic, based on an independent survey of 3,100 IT managers in 12 countries, and learn more by vising our website at www.pinecc.com
Tags : 
    
Pine Cove Consulting
Published By: Pine Cove Consulting     Published Date: Oct 03, 2019
To understand the realities of endpoint security today, Sophos commissioned independent research specialist Vanson Bourne to survey 3,100 IT managers across the globe. The resulting paper reveals the experiences, concerns and future plans of organizations in 12 countries and six continents. It provides deep insight into the day-to-day challenges IT teams face securing their organizations against cyberattacks, as well as their experiences with endpoint detection and response (EDR) technologies.
Tags : 
    
Pine Cove Consulting
Published By: Pine Cove Consulting     Published Date: Oct 03, 2019
To understand the realities of endpoint security today, Sophos commissioned independent research specialist Vanson Bourne to survey 3,100 IT managers across the globe. Check out this infographic for insight into the day-to-day challenges IT teams face securing their organizations against cyberattacks.
Tags : 
    
Pine Cove Consulting
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.