data breach

Results 1 - 25 of 426Sort Results By: Published Date | Title | Company Name
By: HP Enterprise Services     Published Date: Mar 20, 2014
Learn how to properly assess the security needs for your organization and see what areas your team needs to focus its attention on in order to protect your data.
Tags : data breaches, protection, free assessment tool, prevent data breaches, avoid costs, security, data management
     HP Enterprise Services
By: CheckMarx     Published Date: Jun 07, 2019
Data breaches continuing to make the headlines and enterprises are no longer questioning "if" a breach will occur, but "when." With the organization's data assets and reputation at stake, having a breach response plan in place is becoming increasingly important. Join security thought leaders and experts for an interactive Q&A to learn more about: - Today’s cybersecurity threat landscape - The true costs of a breach - Preventing breaches: Key factors to consider - Why early breach detection is critical - How to develop an effective incident response plan and get C-Suite buy-in - How to keep your company secure in 2019"
Tags : 
     CheckMarx
By: Mimecast     Published Date: Aug 22, 2017
Healthcare organizations are a favorite target for determined attackers. Any disruption to critical services provides a strong incentive to pay a ransom and patient medical data is highly lucrative for the information it contains. Research finds that providers have traditionally under invested in IT security, which further compounds the problem. Read the report to learn: • Important cyber security risks • The impact of a data breach to your organization • Key regulations around the globe
Tags : healthcare, data protection, patient medical data
     Mimecast
By: Gigamon     Published Date: Sep 03, 2019
We’ve arrived at the second anniversary of the Equifax breach and we now know much more about what happened due to the August 2018 release of the GAO Report. New information came out of that report that was not well-understood at the time of the breach. For example, did you know that while Equifax used a tool for network layer decryption, they had certificates nine months out of date? This lapse gave the threat actors all the time they needed to break in and exfiltrate reams of personal data. As soon as Equifax updated the certs on their decryption tools, they began to realize what happened. On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. That’s more important than ever today; Ponemon Institute reports that 50% of all malware attacks utilize encryption. During this webinar, we’ll talk about: -How TLS/SSL encryption has become a threat vector -Why decryption is essential to security and how to effectively pe
Tags : 
     Gigamon
By: Akamai Technologies     Published Date: May 08, 2017
We are coming to expect quality video in all our digital experiences – from online shopping to on the job training. However, as video technology has become more ubiquitous, it has also become more complex. To deliver a quality experience to users, regardless of their device and connectivity, you need a holistic video strategy. We’ve tapped into our experience to present the top issues you must address to ensure a successful online video strategy. Download now to learn more!
Tags : device management, data solutions, system solutions, data breach, mobile management
     Akamai Technologies
By: Symantec     Published Date: Jun 27, 2013
Symantec Corporation and Ponemon Institute are pleased to present the 2013 Cost of Data Breach: Global Analysis, our eighth annual benchmark study concerning the cost of data breach incidents for companies located in nine countries. Since 2009, we have provided a consolidated report of the benchmark findings from all countries represented in the research. In this report, we present both the consolidated findings and country differences.
Tags : symantec, data breach, global analysis, benchmark findings, research, best practices, technology, security, knowledge management, data management, business technology, data center
     Symantec
By: IBM     Published Date: Jan 09, 2015
IBM sponsored the and Ponemon Institute examined the actual costs of data breaches at 61 US companies and drew on the results of more than 500 interviews to reveal the true costs of data breaches today, from detection and escalation to customer churn. Read the analyst research to find out the average number of breached records per company, the real reasons most data breaches occur, the capital outlays that a breach requires, and the rate at which customers abandon companies after a breach occurs.
Tags : data breaches, data breach detection, business continuity management, malware, security, knowledge management, data management
     IBM
By: NetDiligence     Published Date: Apr 30, 2015
A Study of Actual Payouts for Covered Data Breaches.
Tags : network security, security policies, disaster recovery, compliance
     NetDiligence
By: IBM     Published Date: Jul 31, 2015
Data breach study.
Tags : data, cost global, security
     IBM
By: IBM     Published Date: Oct 13, 2015
What truly affects the cost of a data breach? Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and country.
Tags : ibm, data breach, ponemon institute, jp morgan, global analysis, networking, security, software development, it management, knowledge management, enterprise applications, data management, business technology, research
     IBM
By: IBM     Published Date: Jan 07, 2016
Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and country.
Tags : ibm, data breach, analysis, ponemon institute, networking, security, business technology
     IBM
By: IBM     Published Date: Apr 04, 2016
What truly affects the cost of a data breach? Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and country.
Tags : ibm, data breach, global, ponemon institute, knowledge management, enterprise applications
     IBM
By: IBM     Published Date: Apr 04, 2016
What truly affects the cost of a data breach? Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and in the United States.
Tags : ibm, data breach, united states, ponemon institute, knowledge management, enterprise applications
     IBM
By: Lumension     Published Date: Jun 03, 2015
The IT news over the last year has been filled with story after story on data breaches, making the release of Lumensions’ 4th annual data protection maturity report all the more relevant. Review this report for a timely analysis of the threats, responses, policies, and technologies comprising today’s shifting data security landscape. It also reveals how organizations have made progress, the steps they plan to take to address data protection challenges in 2015—and where they may still be at risk.
Tags : data protection, data, security, cloud, storage
     Lumension
By: xMatters     Published Date: Feb 04, 2015
Staying on top of cutting-edge communication trends can be the difference in saving lives during a disaster or even preserving customer loyalty by notifying people during a major business interruption. Get the complimentary report written by industry expert Dr. Steven B. Goldman and learn the important trends you need to be aware of in 2015, including: • The increase in security budgets, as well as fines and lawsuits • The continuing rise in data breaches and malicious cyber attacks • The impact of social media on crisis preparations and response • Why natural disasters may be the least of your worries • And most importantly, how to survive the robot uprising!
Tags : security, budgets, disaster, business interruption, social media, data breaches, customer loyalty, communication trends, knowledge management
     xMatters
By: IBM     Published Date: Jan 09, 2017
Reviewing a year of serious data breaches, major attacks and new vulnerabilities. The IBM X-Force 2016 Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide in 2015.
Tags : ibm, security, ibm x-force, cyber security intelligence index., cyber security, intelligence, enterprise applications, business technology
     IBM
By: McAfee     Published Date: Mar 31, 2017
Data loss remains a serious issue , and data loss prevention is an important tool for companies to reduce the risk of a breach. The Ponemon Institute conducted a global survey of 1,000 IT decision makers, to develop benchmarks for data loss prevention incidents, visibility, and maturity.
Tags : data loss prevention, data loss benchamrks, data breaches, data protection strategy, data protection benchmarks
     McAfee
By: Gigamon     Published Date: Dec 13, 2018
Despite increasing security budgets, companies find there is too much data for new tools to analyze, not enough skilled IT security professionals and little confidence in current technology investments. Read the “2018 Cyberthreat Defense Report” to learn how your peers are managing increased breaches, vulnerabilities and encrypted traffic. How does your cyberthreat approach compare to other security pros who are protecting their organizations? Learn now.
Tags : 
     Gigamon
By: Canon Solutions America     Published Date: Oct 17, 2017
Transforming government processes starts with laying the right foundation for your organization’s workflow. Many government agencies have embarked on transformation initiatives; however, there is still room for improvement to build a more stable transformation foundation.
Tags : pii security, pii breach, pii compliance checklist, how to protect pii, pii information security, pii data compliance, pii data protection, pii data breach, pii encryption, pii encryption best practices, public sector printing, secure public sector printing, security breach in public sector
     Canon Solutions America
By: IBM     Published Date: Jul 15, 2015
How IT leaders conduct vulnerability assessments, and implement proactive strategies to protect their data.
Tags : database vulnerability, proactive strategies, data protection, compliance, data breach, data security, risk reduction
     IBM
By: Lenovo and Intel     Published Date: Jul 10, 2018
The risk of cyber attacks and the cost of failure are increasing. Penalties associated with failure are only going to increase. And these challenges are compounded by increasing collaboration, use of cloud-based solutions, and an increasingly mobile workforce. Join experts from Forrester, Lenovo and Microsoft as they explore Forrester’s newly updated Zero Trust Extended framework. Then Lenovo covers how the four core components of its Data, Identity, Online and Device (DIODe) approach can minimize risk to data and critical IT. By taking these important steps toward a full Zero Trust Extended framework, you can: Protect the business from advanced threats Reduce the impact of breaches Easily support new business and operating models Rise to the challenge of evolving regulations like FISMA, HIPPA, PCI and GDPR
Tags : 
     Lenovo and Intel
By: Dell EMC & Intel     Published Date: Sep 06, 2018
For organisations that aim to modernise their IT environments and limit operational risks that can incur costs, IDC recommends making data protection initiatives a top priority. Modernise data protection to cut IT costs and advance IT Transformation. Modern data protection enables organisations to shrink data backup and recovery windows , which means fewer security breaches and faster resolutions when they do happen. To truly transform IT, modernise your data center to increase IT efficiency and shed technical debt while protecting your bottom line. Drive IT Transformation and results with leading enterprise solutions from Dell EMC powered by Intel®.
Tags : 
     Dell EMC & Intel
By: Tenable     Published Date: Jan 25, 2019
"Web application attacks are the top source of data breaches today. The 2018 Cybersecurity Insiders Application Security Report reveals that 62% of cybersecurity professionals are at best moderately confident in their organization’s application security posture. Not surprisingly, about the same number consider their application security strategies immature.Applications play a critical role in supporting key business processes, but organizations are struggling to keep them safe. This eBook examines the 5 best practices for application security. Read this ebook now to understand: -Which types of apps present the highest security risk -Best practices for reducing security risks associates with web applications -Steps you can take now to secure web applications "
Tags : 
     Tenable
By: Entrust Datacard     Published Date: Jul 21, 2014
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes.
Tags : defending, enterprise, data security, protection, private identity, information transactions, trust, authentication, identity assurance, security
     Entrust Datacard
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com