data breach

Results 276 - 300 of 397Sort Results By: Published Date | Title | Company Name
By: Palo Alto Networks     Published Date: Apr 25, 2017
SANS conducted this survey to explore how organizations are handling prevention. Breaking down possible preventive measures into four major categories or domains (business, architectural design and development, operational, and technology), the survey sought to answer three major questions: 1. What measures have respondents implemented that they believe will prevent breaches? 2. What measures not necessarily implemented do respondents consider preventive? 3. What barriers have stopped respondents from doing what they should be doing?
Tags : 
     Palo Alto Networks
By: LifeLock     Published Date: Feb 24, 2017
Data breach and tax fraud continue to make the news, so it’s important for employers to think about the subject in a more proactive way. Why wait until open enrollment to discuss this essential benefit? You can provide an immediate solution that empowers you to engage with employers now to help protect their employees immediately.
Tags : 
     LifeLock
By: RSA     Published Date: Sep 19, 2017
This paper sets out five basic steps organizations may want to consider to help set up a framework for managing GDPR risk.
Tags : rsa, rsa security, data breach, data protection, gdpr
     RSA
By: OKTA     Published Date: Oct 23, 2017
Most organizations have a dirty little secret: they are relying on user and password-based authentication to protect sensitive internal applications. With 81% of data breaches involving weak or stolen credentials1, applications that use single-factor authentication are an easy target for attack. Unfortunately, updating internal cloud applications—as well as legacy and custom applications—to support multi-factor authentication can be an IT headache for many organizations. Okta and Palo Alto Networks have collaborated to make rolling out multi-factor authentication a snap. Join Daniel Lu, Product Marketing Manager at Okta and Kasey Cross, Sr. Product Marketing Manager at Palo Alto Networks, to learn: >The latest trends in credential-based attacks >Why every sensitive cloud application needs multi-factor authentication >How to enforce network-level multi-factor authentication without touching your apps using Palo Alto Networks and Okta
Tags : 
     OKTA
By: VeriSign     Published Date: Feb 10, 2011
In this must read white paper, you will learn about the new advances in attacks that exploit weaknesses of generic SSL to compromise server-server communication and how you can help prevent it.
Tags : verisign, spoofing server, server communication, ssl, data security breach, network security, enterprise network
     VeriSign
By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : cyber attacks, cia, nsa, wannacry, notpetya
     BlackBerry Cylance
By: Qualys     Published Date: Jan 11, 2017
In this age of supply chain interconnectedness, a large organization may have hundreds of third parties with access to its physical premises, IT networks and data. Your organization may have a secure IT infrastructure, but third parties can make it vulnerable to breaches, which often result in corporate data theft, brand damage and hefty government fines.
Tags : information security, it compliance, it audit, it security, network security, web application security, application security
     Qualys
By: Qualys     Published Date: Jan 11, 2017
When web applications are breached, enormous amounts of sensitive business data can be lost. According to Verizon’s 2014 Data Breach Investigations Report, web application attacks more than doubled in 2013 to become the #1 cause of security incidents
Tags : information security, it compliance, it audit, it security, network security, web application security, application security
     Qualys
By: Qualys     Published Date: Nov 16, 2012
This whitepaper discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smalles to multinational enterpries, to put trust back into the security equation.
Tags : cloud based services, security, it security, data breach, ssl, ssl governance, business technology
     Qualys
By: CarbonBlack     Published Date: Mar 16, 2016
Today’s cyber-attacks have changed in sophistication, in focus, and in their potential impact on your business. This eBook will outline the tactics today’s advanced attackers are using to break into your organization and why you require a defense-in-depth cyber security program that incorporates automatic detection and incident response.
Tags : carbon black, cyber attacks, cyber security, attacks, security, advanced attacks, detection
     CarbonBlack
By: Bit9     Published Date: Mar 07, 2013
In this whitepaper, Industry Analyst Frost and Sullivan examines today’s advanced threat landscape and recommends that organizations adopt a new approach to server security that is based on trust.
Tags : data breaches, data center, security, cyber threats, server, business continuity
     Bit9
By: Symantec     Published Date: Sep 14, 2015
When organizations fail to integrate their people, processes, and technology, it hinders their ability to quickly detect and respond to an incident and keep it from becoming a data breach. The result? Increased risk for every security incident they face. The proposal? Execute a holistic approach that address the before, during, and after stages of a potential breach.
Tags : data breach, data security, increased risk
     Symantec
By: Imperva     Published Date: Jun 14, 2012
This paper describes the financial implications of Web attacks, DDoS attacks, and other Web-based threats. It shows how the SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and Website downtime.
Tags : imperva, application security, security costs, roi, firewall, ddos, web attacks, it spending, business technology
     Imperva
By: Microsoft Office 365     Published Date: Sep 08, 2016
Data breaches are more than a security problem. A significant attack can shake your customer base, partner relations, executive staff, profits, and revenue. Historic data breaches have cost executives their jobs, resulted in major revenue losses and damaged brand reputations.
Tags : 
     Microsoft Office 365
By: ForeScout     Published Date: Mar 28, 2017
As successful data breaches continue to occur with increased frequency, organizations must address core challenges instead of simply adding security products. In this white paper, IDC suggests that organizations adopt an "already breached" attitude that focuses on device visibility and detection.
Tags : data, breach, frequency, organizations, idc, device, visibility
     ForeScout
By: CA Technologies EMEA     Published Date: Aug 03, 2017
The key tenets of protecting data privacy are: knowing where your data resides, understanding who has access to the data and what are they doing with it, and knowing how the data is being used internally that may result in non-compliance. Additionally, most compliance projects are major, company-wide initiatives and must be managed properly to meet deadlines and keep costs in check.
Tags : classify data, gdpr, risk reduction, breach protection, anonymize data, privacy projects, data management
     CA Technologies EMEA
By: IBM     Published Date: Oct 10, 2013
We all know how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly. But what can you do about it? The IBM white paper “Responding to—and recovering from—sophisticated security attacks” details four proactive steps that you can—and should—take now to help keep your organization safe: prioritize your business objectives and set your risk tolerance; protect your organization with a proactive security plan; prepare your response to the inevitable sophisticated attack and promote and support a culture of security awareness. Read the white paper to learn how to help keep your organization safe from sophisticated security attacks and find out how IBM can help.
Tags : security, data security, networks, branding, attacks, security, security breach, safeguarding, infastructure, risk, risk tolerance, security attacks, it management, data management, business technology
     IBM
By: IBM     Published Date: Aug 06, 2014
With disastrous data breaches in the headlines, retail executives need to re-think the dangers of their digital environment. What are the best ways to protect the business? Keeping ahead of attackers will require a combination of systems defense, analytics and the ability to react quickly
Tags : ibm, retail, data, security, digital, defense, analytics
     IBM
By: IBM     Published Date: Feb 11, 2015
IBM Security QRadar Incident Forensics optimizes the process of investigating and gathering evidence on attacks and data breaches, using full network packet capture data to deliver insight and analysis that cannot be achieved using only log source events and network flow details.
Tags : ibm, data breaches, it attacks, cyber-crime, forensics solution, security, it management
     IBM
By: IBM     Published Date: Apr 09, 2015
This survey examines the costs incurred by organizations after experiencing genuine data loss incidents.
Tags : data loss, data breach, cost, ibm, security, security risk, it management, wireless, knowledge management
     IBM
By: IBM     Published Date: Apr 09, 2015
Optimize the process of investigating and gathering evidence on attacks and data breaches with Network Forensics software. Learn how using full network packet capture data can deliver insight and analysis that cannot be achieved using only log source events and network flow details.
Tags : ibm, optimization, security, cyber crime, network security, it security
     IBM
By: IBM     Published Date: Jul 15, 2015
How IT leaders conduct vulnerability assessments, and implement proactive strategies to protect their data.
Tags : database vulnerability, proactive strategies, data protection, compliance, data breach, data security, risk reduction
     IBM
By: IBM     Published Date: Jul 15, 2015
This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe
Tags : big data security, data privacy, data protection, sensitive data, data risk management, vulnerability management, ibm solutions, data breaches, compliance
     IBM
By: IBM     Published Date: Jul 31, 2015
Data breach study.
Tags : data, cost global, security
     IBM
By: IBM     Published Date: Oct 13, 2015
What truly affects the cost of a data breach? Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and country.
Tags : ibm, data breach, ponemon institute, jp morgan, global analysis, networking, security, software development, it management, knowledge management, enterprise applications, data management, business technology, research
     IBM
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com