target

Results 1 - 25 of 1118Sort Results By: Published Date | Title | Company Name
Published By: Cisco Umbrella EMEA     Published Date: Jun 01, 2020
alicious attackers are finding targets in bold new ways. Today's cyber threat landscape is expanding to include some vectors you're likely familiar with, and others you may have never seen before. Read the trend report to learn how to stay one step ahead of cyber attackers.
Tags : 
    
Cisco Umbrella EMEA
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 19, 2020
A Fortune 500 retailer, manages a gift card program with a stored value of over $5B. Cybercriminals targeted the program, stealing tens of millions of dollars from the company and its customers. Attackers used credentials spilled from other website breaches to hijack customer accounts and steal funds from gift cards. Traditional defenses, like web application firewalls, intrusion detection and prevention services, and fraud analytics, failed to prevent these ongoing automated attacks. Find out how Shape Security helped to eliminate $10s of millions in fraudulent transactions and chargeback fees.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 18, 2020
A Fortune 500 retailer, manages a gift card program with a stored value of over $5B. Cybercriminals targeted the program, stealing tens of millions of dollars from the company and its customers. Attackers used credentials spilled from other website breaches to hijack customer accounts and steal funds from gift cards. Traditional defenses, like web application firewalls, intrusion detection and prevention services, and fraud analytics, failed to prevent these ongoing automated attacks. Find out how Shape Security helped to eliminate $10s of millions in fraudulent transactions and chargeback fees.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Automation Anywhere APAC     Published Date: May 08, 2020
Sprint’s finance team wanted to overcome the problem of lack of resources. Started with tax department to put handful of automations, Sprint worked with Automation Anywhere with the target to automate 50 use cases as quickly as possible – an unprecedented scope and timeline. The intense focus provided Sprint with an invaluable insight into how automation can change the company’s culture and the ways it’s employees work, with 50+automations already developed and 50+ additional use cases in pipeline. Read the full case study now.
Tags : 
    
Automation Anywhere APAC
Published By: Automation Anywhere APAC     Published Date: May 08, 2020
Sprint’s finance team wanted to overcome the problem of lack of resources. Started with tax department to put handful of automations, Sprint worked with Automation Anywhere with the target to automate 50 use cases as quickly as possible – an unprecedented scope and timeline. The intense focus provided Sprint with an invaluable insight into how automation can change the company’s culture and the ways it’s employees work, with 50+automations already developed and 50+ additional use cases in pipeline.
Tags : 
    
Automation Anywhere APAC
Published By: Yotpo     Published Date: May 05, 2020
Today’s consumers crave mobile experiences tailored to how they prefer to shop. The most successful eCommerce brands are looking to SMS marketing to directly engage their customers with hyper-targeted messages that drive higher conversion, fast.
Tags : 
    
Yotpo
Published By: Proofpoint     Published Date: May 05, 2020
Email fraud costs companies around the world billions, and can destroy brand reputation and consumer trust in a matter of minutes. Highly-targeted, low volume business email compromise (BEC) scams are arguably the most dangerous, costing organizations around the globe $26.2 billion since 2016, according to the FBI. The DMARC (Domain-based Message Authentication Reporting & Conformance) standard, unveiled by a group of leading email organizations in February 2012, is one of the most powerful and proactive weapons to date in the fight against phishing and spoofing. It has reshaped the email fraud landscape, disrupting long standing phishing strategies and forcing cybercriminals to abandon preferred targets. DMARC has the potential to nullify an entire class of fraud within the next few years. In this guide, we’ll cover what DMARC is, how it works, its key benefits, and what it means to your organisation.
Tags : 
    
Proofpoint
Published By: Menlo Security     Published Date: Apr 30, 2020
Traditional detect-and-respond cybersecurity strategies are highly ineffective and inefficient. Threat actors today are overwhelmingly targeting the weakest link in the security apparatus: people. The soft costs of an unsuccessful cybersecurity strategy can be burdensome. Infections need to be fixed and holes need to be patched. Fines and audits can be costly as well and the loss of public trust can be devastating to a company’s bottom line. In this white paper, we dive into the benefits of Web Isolation and provide an analysis on the true hidden costs of failed web security approaches. This whitepaper examines: • Why traditional cybersecurity strategies aren't effective • The soft costs of an unsuccessful cybersecurity strategy • The benefits of a web isolation approach
Tags : 
    
Menlo Security
Published By: Menlo Security     Published Date: Apr 30, 2020
Credential Phishing—Uniquely Targeting Individuals with Access to Valuable Data and Systems. The most notorious credential phishing campaign was the attack on John Podesta, the chairman of the Hillary Clinton presidential campaign during the 2016 election. But while many know about this attack, few understand what and how it happened. Credential phishing is a rapidly growing form of cyberattack and security professionals need to better understand these increasingly common and destructive forms of cyberattacks. This whitepaper examines: • What is credential phishing? • What are the risks to my organisation? • What can I do to stop them?
Tags : 
    
Menlo Security
Published By: Carbon Black     Published Date: Apr 27, 2020
Cybercrime is big business today—the World Economic Forum estimates its value at trillions of dollars each year 1 and characterizes its impact 2 as: Similar to that of a natural disaster Greater than that of a man-made environmental disaster and more likely to happen Among the factors driving the growth and impact of cybercrime are an unprecedented level of collaboration among nation states and increased cooperation among attackers generally. Meanwhile, defensive technologies and approaches continuously improve, forcing attackers to become more organized and sophisticated, and make increased use of techniques like island hopping. We also expect cloud jacking to become more widespread as attackers target the cloud and hybrid infrastructures many organizations rely on today. And we anticipate a continued shift toward financial gain as the primary motivator of most attacks, with a parallel decline in focus on the theft of intellectual property (IP) and customer information.
Tags : 
    
Carbon Black
Published By: Crowdstrike     Published Date: Apr 23, 2020
All organizations can be the target of ransomware. Although big game hunting is on the rise – where ransomware operators target large enterprise organizations to gain huge payouts, ransomware is frequently aimed at small & medium-sized organizations, which are often more vulnerable to attacks. Small businesses are targeted for several reasons, from money and intellectual property (IP) to customer data and access. Smaller organizations face different challenges than larger ones, and they also know that smaller organizations often face the same threats and need the same standard of protection. This paper explains the impact of ransomware on small and medium-sized organizations, explores factors that lead to increased vulnerability and offers advice on how to protect and secure your organisation with a next generation endpoint protection platform that uses an array of complementary prevention and detection methods to fight against constantly shifting ransomware techniques.
Tags : 
    
Crowdstrike
Published By: SAS     Published Date: Apr 20, 2020
A Harvard Business Review Analytic Services Report Today’s consumers expect immediate, personalized interactions. To meet these expectations, companies must differentiate their brands through timely, targeted and tailored customer experiences based on real-time data analytics. This report, sponsored by SAS, Intel and Accenture and conducted by Harvard Business Review Analytic Services, looks at how businesses are using advanced customer data analytics, along with real-time analytics and real-time marketing, to enhance their customers’ experiences. Learn why organizations that place a high value on real-time capabilities still struggle to achieve them, what companies can do to ensure success as they adopt and implement real-time analytics solutions, and what benefits successful companies are already seeing.
Tags : 
    
SAS
Published By: HP Inc.     Published Date: Apr 20, 2020
x
Tags : 
    
HP Inc.
Published By: Carbon Black     Published Date: Apr 20, 2020
2019 has ushered in a historic crime wave in finance. Financial institutions are facing an evolving threat landscape. Fileless attacks and modular malware have been deployed widely across the financial sector supply chain. These attack vectors easily bypass traditional AV. This is compounded by the 160 percent increase of destructive attacks since 2018. The Bank heist has escalated to a hostage situation. The financial sector has long been the target of some of the world’s greatest guilds of thieves however now nations states are targeting the sector to offset economic sanctions as evidenced by the North Korean and Russian indictments. The defense in depth architectures are failing due to the advent of SaaS, mobile banking and the migration to the cloud. To learn more about how VMware Carbon Black can help your business, download this report today.
Tags : 
    
Carbon Black
Published By: Carbon Black     Published Date: Apr 20, 2020
The majority of today’s cyberattacks feature advanced tactics such as lateral movement and island hopping that target legitimate tools to inflict damage. These sophisticated hacking methods pose a tremendous risk to targets with decentralized systems protecting high-value assets, including money, intellectual property and state secrets. VMware Carbon Black Cloud™ thwarts attacks by making it easier to: Analyze billions of system events to understand what is normal in your environment . Prevent attackers from abusing legitimate tools. Automate your investigation workflow to respond efficiently. To learn more download this report today.
Tags : 
    
Carbon Black
Published By: Carbon Black     Published Date: Apr 20, 2020
It is projected that, by the end of 2019, ransomware will attack an organization every 14 seconds. Today's businesses are routinely choosing to pay hefty ransoms rather than lose access to their intellectual property, patient records, credit card information, and other valuable business data. Simply put, targeted businesses are paying ransoms in order to avoid significant disruptions to every-day operations. Is your organization properly prepared to defend against the next generation of ransomware? Download the eBook to learn: Ransomware: A brief history and timeline. How ransomware works. Keys to stopping never-seen-before ransomware and fileless ransomware.
Tags : 
    
Carbon Black
Published By: Marketo     Published Date: Apr 17, 2020
Whether you’re a novice or an expert marketer, A/B testing should be part of your campaign optimization toolkit. By testing one element at a time to see how it affects the broader performance of a program, you can assess the effectiveness of each variable in driving conversions and make necessary adjustments. By continuing to refine based on test outcomes, you’re in the driver’s seat to deliver the best ROI to your organization. Done correctly, A/B testing enhances your expertise about these audiences, helps optimize programs for your target audience, and increases your engagement with buyers. Access this cheat sheet to learn about three of Marketo’s most effective demand generation tests that you can start using today.
Tags : 
    
Marketo
Published By: CrowdStrike     Published Date: Apr 08, 2020
The maturity level of mobile security solutions lags behind that of traditional platforms, such as desktop computers and servers. Because of this, malicious actors are increasingly targeting mobile devices and seeking to diversify the ways in which they attempt to compromise their targets and achieve their objectives. This report discusses how certain adversary groups and criminal actors are targeting mobile devices for intelligence and financial gain, and how these threats may be evolving. You’ll also learn the types of mobile malware your organization may be facing now and get tips on how to achieve an optimal defense going forward. Download this report to learn: Why the targeting of mobile platforms is being increasingly adopted by a range of criminal and targeted adversary groups Why mobile devices often do not have the same level of security monitoring as desktop computers and servers Potential future changes in mobile malware and how you can better protect your organization ag
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Apr 08, 2020
The maturity level of mobile security solutions lags behind that of traditional platforms, such as desktop computers and servers. Because of this, malicious actors are increasingly targeting mobile devices and seeking to diversify the ways in which they attempt to compromise their targets and achieve their objectives. This report discusses how certain adversary groups and criminal actors are targeting mobile devices for intelligence and financial gain, and how these threats may be evolving. You’ll also learn the types of mobile malware your organization may be facing now and get tips on how to achieve an optimal defense going forward. Download this report to learn: Why the targeting of mobile platforms is being increasingly adopted by a range of criminal and targeted adversary groups Why mobile devices often do not have the same level of security monitoring as desktop computers and servers Potential future changes in mobile malware and how you can better protect your organization ag
Tags : 
    
CrowdStrike
Published By: LastPass APAC     Published Date: Mar 31, 2020
"Security breaches are not just a threat to large enterprises with well known names. While these may be the breaches you hear about in the news, midsize enterprises are just as much a target for hackers. And unfortunately, these small organizations have less resources to fight against these threats. Identity and access management solutions are key to securing the identities in your organization and allowing employees to access the applications they need securely and efficiently. But midsize enterprises often don’t have the resources – time, budget, staff – to purchase, implement and manage these tools. Gartner’s new report “Midmarket Context: Magic Quadrant for Access Management” can help midsize enterprises evaluate access management tools that can meet the needs for simplicity, ease of use and adoption. The report includes: -Market differentiators -Technology selection considerations -A list of Notable Vendors to consider Download a complimentary copy of the full report."
Tags : 
    
LastPass APAC
Published By: Zscaler     Published Date: Mar 24, 2020
Nel dicembre 2013, Target diventò l'emblema del rischio correlato a terze parti. La violazione della sicurezza di Target comportò la compromissione di 40 milioni di informazioni sulle carte di credito e debito dei clienti, con conseguenti costi di recupero, derivanti dalla violazione, pari a quasi 252 milioni di dollari, insieme al crollo della sua buona reputazione. Questa violazione, sebbene sfortunata, non fu causata da un attacco diretto alla rete di Target. Fu il risultato di un fornitore terzo compromesso, che aveva accesso ai sistemi di Target. Una delle macchine del venditore fu colpita da un attacco di phishing e infettata da malware, che fu utilizzato per rubare le credenziali al portale dei fornitori online di Target. Con le credenziali dei partner in mano, gli hacker furono in grado di accedere facilmente alla rete di Target senza essere rilevati. Target non è l'unica società che è stata vittima di una violazione dannosa correlata a terze parti. Poiché la necessità di par
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Mar 24, 2020
En diciembre de 2013, Target se convirtió en el ejemplo perfecto del riesgo procedente de terceros. La violación de seguridad de Target hizo que se viera comprometida información de tarjetas de crédito y débito de 40 millones de clientes, lo que resultó en casi 252 millones de dólares en costos de recuperación por incumplimiento, junto con la caída de su buena reputación.
Tags : 
    
Zscaler
Published By: Sayari Labs     Published Date: Mar 18, 2020
Across the world, legal entities are afforded great flexibility and maneuverability - often at the cost of decreased transparency and legal liability. These features, while in many ways great for a thriving business environment, make detecting traditional risk indicators and protecting against costly liabilities exceedingly difficult. Understanding ultimate beneficial ownership provides you with the necessary tools to protect your business and investments, and ensures peace of mind when making decisions spanning multiple jurisdictions and stakeholders. This report has shown the various ways in which ultimate beneficial ownership can be established across official sources in hard-target jurisdictions. Only by understanding and implementing these methodologies can risks associated with collaborating with legal entities in opaque jurisdictions be properly mitigated.
Tags : 
    
Sayari Labs
Published By: Schneider Electric     Published Date: Mar 16, 2020
Climate is increasingly embedded in companies’ strategies. Economic actors are committing to reduce their carbon emissions and set « 2 and 1.5°C compatible » (or science-based) targets, striving to reduce risks and capture new opportunities associated with the energy and climate transition. Climate mitigation strategies make good business sense: energy efficiency, resource circularity and renewable energy enable recurring cost savings and to increase the resiliency of supply chains. CO2 pricing has already been enforced in several geographies (through quotas or taxes), and the cost of resources shows important volatility, weighing on productivity. Companies also ambition to increase the resiliency of their assets by avoiding “stranded assets” risks, meaning the deterioration of asset value due to inequation with “2°C-compatible” markets and regulations. The climate transition is also an opportunity to innovate, outpace competitors and attract talents, and appears as one the mega-trends
Tags : 
    
Schneider Electric
Published By: Crowdstrike     Published Date: Mar 09, 2020
In-depth Analysis of the Top Cyber Threat Trends Over the Past Year The 2020 Global Threat Report is one of the industry’s most highly anticipated reports on today’s most significant cyber threats and adversaries. It features a comprehensive overview of the global investigations and deep analysis conducted by the CrowdStrike® Intelligence team, the Falcon OverWatch™ managed threat hunting team and the CrowdStrike Services incident response team throughout 2019. The report covers real-world scenarios & observed trends in attackers’ ever-evolving tactics, techniques and procedures, and offers practical recommendations to protect your organization in the coming year. Some highlights: • Big game hunting (BGH) escalated • Cybercriminals are weaponizing sensitive data • The eCrime ecosystem continues to evolve • Outside of BGH, an increase was observed in eCrime campaigns targeting financial institutions • The trend toward malware-free tactics accelerated • State-sponsored targeted intrus
Tags : 
    
Crowdstrike
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.