data attacks

Results 1 - 25 of 232Sort Results By: Published Date | Title | Company Name
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way today’s modern business operates. They’ve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware.¹ While malware’s pervasiveness may not come as a surprise to many people, what’s not always so well understood is that automating app attacks—by means of malicious bots —is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Blackberry     Published Date: Jul 12, 2019
Law firms have received two dramatic wake-up calls about the vital importance of data security in the last two years. First, there was the leak of 11.5 million documents from offshore law firm Mossack Fonseca, known as the Panama Papers, which became public in 2016.1 Then came the massive cyberattack on prominent global law firm DLA Piper in the summer of 2017.2 As we will explore, despite the industry’s aversion to media coverage of such attacks, less-visible breaches involving the legal profession are being reported worldwide in ever-increasing numbers.
Tags : 
    
Blackberry
Published By: Gigamon     Published Date: Jun 21, 2019
Organisations have invested heavily in cybersecurity tools and yet more than five million data records are lost or stolen every day. The problem is not that today’s cybersecurity tools are badly designed or missing features, the problem is that surging volumes of network traffic overwhelm security tools, causing administrators to use sampling or disable advanced features in order to preserve application performance. Also, security tools and IT staff don’t get all the data they need to detect and respond to outside attacks and insider incidents, because they are faced with “blind spots” in data collection. Read this business brief in local language to find out how
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Sep 03, 2019
We’ve arrived at the second anniversary of the Equifax breach and we now know much more about what happened due to the August 2018 release of the GAO Report. New information came out of that report that was not well-understood at the time of the breach. For example, did you know that while Equifax used a tool for network layer decryption, they had certificates nine months out of date? This lapse gave the threat actors all the time they needed to break in and exfiltrate reams of personal data. As soon as Equifax updated the certs on their decryption tools, they began to realize what happened. On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. That’s more important than ever today; Ponemon Institute reports that 50% of all malware attacks utilize encryption. During this webinar, we’ll talk about: -How TLS/SSL encryption has become a threat vector -Why decryption is essential to security and how to effectively pe
Tags : 
    
Gigamon
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
As Italy’s businesses grew increasingly vulnerable to the threat of ransomware, data breaches, and other malicious malware attacks, service provider Telecom Italia sought an innovative solution to effectively and efficiently protect the network and data of its business users. In this case study, you’ll read about how Italy’s largest service provider partnered with Cisco Umbrella to increase value for customers and accelerate their revenues with cloud security.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"Cloud applications provide scale and cost benefits over legacy on-premises solutions. With more users going direct-to-internet from any device, the risk increases when users bypass security controls. We can help you reduce this risk across all of your cloud and on-premises applications with a zero-trust strategy that validates devices and domains, not just user credentials. See why thousands of customers rely on Duo and Cisco Umbrella to reduce the risks of data breaches and improve security. Don’t miss this best-practices discussion focused on the key role DNS and access control play in your zero-trust security strategy. Attendees will learn how to: ? Reduce the risk of phishing attacks and compromised credentials ? Improve speed-to-security across all your cloud applications ? Extend security on and off-network without sacrificing usability"
Tags : 
    
Cisco Umbrella EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Published By: Panasonic     Published Date: Apr 23, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum. Federal agencies are no strangers to cybersecurity attacks, and several recent high-profile breaches involving mobile devices demonstrate ongoing vulnerabilities in government’s expanding network of endpoints. This issue brief describes what can be done to protect devices, data and networks, including multi-factor authentication to authorization controls and user education.
Tags : 
    
Panasonic
Published By: IdentityIntact for Business     Published Date: Oct 21, 2011
IdentityIntact for Business presents a comprehensive review of how your business can be better protected from data breach attacks by cyber thieves.
Tags : 
    
IdentityIntact for Business
Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA
Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA
Published By: CrowdStrike     Published Date: Aug 01, 2017
While many organizations are guarding the front door with yesterday’s signature-based antivirus (AV) solutions, today’s unknown malware walks out the back door with all their data. What’s the answer? A new white paper, “The Rise of Machine Learning in Cybersecurity,” explains machine learning (ML) technology —what it is, how it works and why it offers better protection against the sophisticated attacks that bypass standard security measures. You’ll also learn about CrowdStrike’s exclusive ML technology and how, as part of the Falcon platform’s next-gen AV solution,it dramatically increases your ability to detect attacks that use unknown malware. Download this white paper to learn:?How different types of ML are applied in various industries and why it’s such an effective tool against unknown malware?Why ML technologies differ and what factors can increase the accuracy and effectiveness of ML ?How CrowdStrike’s ML-based technology works as part of the Falcon platform’s next-generation AV
Tags : 
    
CrowdStrike
Published By: Carbonite     Published Date: Apr 09, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually.1 According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands.2 No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.3 Ransomware is the equivalent of catastrophic data loss, except
Tags : 
    
Carbonite
Published By: Gigamon     Published Date: Oct 19, 2017
Read the Gigamon white paper, Harnessing the Power of Metadata for Security, to see why metadata is the new security super power for enterprises looking to separate signals from noise, reduce time to threat detection, and improve overall security efficacy to combat ever more advanced and persistent cyber attacks. Download now!
Tags : 
    
Gigamon
Published By: Oracle     Published Date: Aug 01, 2018
Your enterprise runs its critical applications on Oracle Databases, and as an enterprise IT leader, maintaining the performance and availability of your databases is among your top priorities. Any degradation in performance or loss of data could result in serious business disruption and loss of revenue, so protecting this vital asset is a must. There are many causes of data loss— administration errors, system or media failures, cyberattacks, and more—but we often overlook design flaws in the very systems meant to protect data: general-purpose backup systems.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 02, 2018
Enterprises like yours face the growing risk of cyberattacks, which increases your exposure to the risk of data loss. One of the most menacing forms of these is ransomware, where your data is encrypted and literally held ransom—until you pay cybercriminals to release it, or you recover your data from a point in time before your systems were attacked. Such attacks and data losses make headlines —damaging your organization’s reputation. And with new regulations concerning data protection coming into force (such as those introduced by the US Department of the Treasury and the European Union) failing to prepare for a quick recovery from a cyberattack could mean serious financial penalties.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 09, 2018
The purpose of IT backup and recovery systems is to avoid data loss and recover quickly, thereby minimizing downtime costs. Traditional storage-centric data protection architectures such as Purpose Built Backup Appliances (PBBAs), and the conventional backup and restore processing supporting them, are prone to failure on recovery. This is because the processes, both automated and manual, are too numerous, too complex, and too difficult to test adequately. In turn this leads to unacceptable levels of failure for today’s mission critical applications, and a poor foundation for digital transformation initiatives. Governments are taking notice. Heightened regulatory compliance requirements have implications for data recovery processes and are an unwelcome but timely catalyst for companies to get their recovery houses in order. Onerous malware, such as ransomware and other cyber attacks increase the imperative for organizations to have highly granular recovery mechanisms in place that allow
Tags : 
    
Oracle
Published By: Limelight Network     Published Date: Aug 12, 2019
Cyber-criminals are increasingly sophisticated and targeted in their attacks. If you are in charge of ensuring the security of your company’s website, it has not been easy going as these notable security incidents reveal: • Sabre Systems—The reservation software company had data from Hard Rock Hotels, Google, Loews, and others, stolen as a result of the breach1. • CIA—WikiLeaks obtained and published documents detailing the intelligence agency’s hacking efforts1. • Virgin America—Thousands of employees and contractors had their login information compromised1. • Equifax—The credit rating agency had a breach into highly sensitive personal information of 143 million U.S. consumers1. • Universities and Federal Agencies—More than 60 universities and US federal organizations were compromised with SQL injections1. There are numerous lessons to be learned from these breaches. Despite the growing stream of news stories about highly damaging attacks that compromise customer info
Tags : 
    
Limelight Network
Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
The volume and complexity of cyber-attacks targeting large enterprises and infrastructure service providers is escalating.
Tags : 
security application, data centers, data, cyber-attacks, security, prevent cyber-attacks
    
Kaspersky Lab Australia and New Zealand
Published By: Dell     Published Date: Feb 04, 2015
In the last few years there have been radical changes in the ways organizations operate and people work. Explosion of data, increased mobile demands, and the globalization of business in general are making 24/7 access to people and information the norm. Sophisticated cyber attacks are requiring robust systems security designed to counter new threats. And velocity is now essential when delivering new IT services.
Tags : 
dell, windows, microsoft, modernization, management, modernization, server, 2003, 2012, support, services, efficiency, cost, platforms, future, mobility, standardization, transformation, challenges, applications
    
Dell
Published By: Alert Logic     Published Date: Aug 25, 2014
The Security Operations Center (SOC) is where security data is transformed into an effective response to attacks. From investigating threats and scanning for vulnerabilities, to reverse-engineering malware and developing new security content to identify the latest threats, the SOC is a critical piece of the security puzzle. Learn how Alert Logic’s SOC operates to protect IT infrastructure from on-premises data centers to the cloud.
Tags : 
    
Alert Logic
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Web application and DDoS attacks hit enterprises without warning or reason. The attacks can expose confidential data and website resources to malicious uses, reduce performance, and render sites unavailable. Responsible organizations proactively block web attacks to protect their reputations, site availability, site performance, and confidential data.
Tags : 
application, security, performance, web attacks, data security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : 
cloud security, cloud solutions, data analysis, cyberattacks
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.