data breach

Results 276 - 300 of 382Sort Results By: Published Date | Title | Company Name
By: BMC     Published Date: Nov 19, 2018
In this book, you learn how SecOps can transform your organization’s security and operations teams to enable a more effective enterprise security posture.
Tags : bmc, bmc software, secops, security operations, cyberattacks, cyber criminals, hacking, data breach
     BMC
By: BMC ASEAN     Published Date: Jan 02, 2019
Bring security and operations together to protect your organization! Collaborative workflow processes that eliminate friction between security and operations teams sharply lower the risk of data breaches and operational downtime. Enterprises can advance their business agenda by minimizing communications breakdowns that leave the organization vulnerable to cyberattacks. This book shows you how!
Tags : 
     BMC ASEAN
By: Ecora Software     Published Date: Aug 15, 2007
High-profile data losses are grabbing more and more headlines every week, threatening the reputation, customer base, and overall bottom line of organization whose systems have been exploited. In addition to this lurking threat, now organizations face potential fines for PCI non-compliance from VISA, beginning in September 2007. Ecora Software will provide you with the information you need to proactively address PCI compliance and, of equal importance, minimize your risk of a costly data breach.
Tags : pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
     Ecora Software
By: HP     Published Date: Jul 29, 2008
The data residing on your storage systems and media, data-at-rest, presents serious security concerns. Regulations and various mandates around the world are putting the burden on companies and government entities to protect the private information they store. Increasingly, companies are being required to publicly disclose breaches that put individuals private data at risk, be it a customer, employee, shareholder, partner, or other stakeholder.
Tags : data security, database security, securing data, customer data, consumer data, pci, cardholder data, mission critical
     HP
By: Infoblox     Published Date: Jun 18, 2015
This in-depth white paper from the SANS institute will bring you up to speed on today’s most dangerous vulnerability. In it, you will learn about: • How DNS works, and why, if unprotected, it can put your network at risk • The different kinds of DNS attacks—and who’s been hit by them • Major compliance frameworks that address the problem • Effective governance and best practices
Tags : infoblox, dns, attacks, effective governance, sans institute, compliance frameworks
     Infoblox
By: SafeNet     Published Date: Jun 04, 2013
To learn more about the current state of the data breach epidemic and how to implement a strategy to prevent it, read SafeNet's Secure Breach Manifesto.
Tags : data breach, data security, it security
     SafeNet
By: HP - Enterprise     Published Date: Aug 31, 2011
New headlines provide ongoing evidence that IT Security teams are losing the battle against attackers, reinforcing the need to address the security of enterprise applications.This Analyst Insight reviews several practical steps you can take to get started now.
Tags : "application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp, software vulnerabilities, critical application vulnerability, hp fortify, aberdeen, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, it security, alm, "application lifecycle management"
     HP - Enterprise
By: Symantec     Published Date: Jun 18, 2015
Learn how to properly secure your enterprise in the cloud and see why it is important to safely move your organization to the cloud.
Tags : mobile devices, enterprise in the cloud, data breach, centralized servcers, security, enterprise applications
     Symantec
By: IBM     Published Date: Nov 19, 2014
As the use of mobile devices exponentially expands, so too does security threats to the increasing number of mobile applications that companies rely on. As a result, companies struggle to keep pace with mobile application security and face the risk of embarrassing and costly data breaches. In this technical session, you’ll learn how Worklight Application Scanning helps you deliver applications that aren’t susceptible to the most common types of malware, including SQL Injection and Cross-Site Scripting. In addition, you’ll learn how this powerful tool helps address the OWASP Top 10 Mobile Risks for 2014.
Tags : application screening, user feedback, mobile app development, cloud-based services, it management, knowledge management, enterprise applications, data management
     IBM
By: NETIQ     Published Date: Mar 12, 2013
NetIQ’s Identity, Access and Security Management solutions integrate seamlessly to help you control access to cloud services and data, reduce your risk of data breaches in mixed environments.
Tags : security and compliance in the cloud, business technology
     NETIQ
By: Qualys     Published Date: Nov 16, 2012
This whitepaper discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smalles to multinational enterpries, to put trust back into the security equation.
Tags : cloud based services, security, it security, data breach, ssl, ssl governance, business technology
     Qualys
By: GFI     Published Date: Jun 03, 2009
More than ever, SMBs need to focus on security as part of their IT infrastructure, building around it rather than considering it as an afterthought. This has become even more critical over the past few years as many businesses have unwittingly lost their customers’ personal data due to security breaches, and as states and countries have responded by enacting laws to force the businesses to implement additional levels of protection.
Tags : gfi, smbs, small, medium, business, it infrastructure, security, windows nt, exchange server, aup, acceptable use policy, remote access policy, secure, internet policy, it management
     GFI
By: CDW     Published Date: Nov 13, 2012
With the right SaaS security solutions, small businesses can gain enterprise-class safeguards at an affordable price.
Tags : cdw, cloud, cloud computing, cloud based security, cybertheft, data breaches, business technology
     CDW
By: IBM     Published Date: Oct 02, 2015
2015 Global Cost of Data Breach Study. The gold standard benchmark from Ponemon Institute and IBM.
Tags : 
     IBM
By: ThreatTrack Security     Published Date: Jan 22, 2015
South Staffordshire College: A U.K. college with 4 campuses, 4,000 students and 500 employees became frustrated with its Kaspersky antivirus and discovered that VIPRE proves robust malware defense doesn’t have to disrupt operations, slow down machines or be difficult to manage.
Tags : threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, vipre, kaspersky
     ThreatTrack Security
By: Canon Solutions America     Published Date: Feb 28, 2019
Limiting access to confidential client files is vital. But choosing the wrong document security solution can overwhelm your staff (and your IT department) and leave your data vulnerable. Learn five important features a security solution should offer.
Tags : legal document management, best legal document management systems, law firm data breach, law firm security breach, law firm data security, legal document automation software
     Canon Solutions America
By: Okta     Published Date: Apr 29, 2015
2014 was a banner year for security breaches. According to the Identity and Theft Research Center, there were 783 reported U.S. data breaches, a 27.5% increase from 2013. Keeping your company and customer data safe is no longer just an IT problem; it's a top concern for C-level executives as well. Your company's reputation and bottom line depend on keeping corporate data secure — yet employee mobility is making this a huge challenge. Read this eGuide to learn how to avoid these challenges with simpler, smarter authentication.
Tags : theft, research center, c-level, okta, theft research, security, it management
     Okta
By: SpectorSoft     Published Date: Apr 18, 2014
Download the Simplifying Employee Investigations white paper and learn about some of the real-world issues businesses face that result in employee investigations, the methodologies used to perform investigations, and then we’ll look at why investigating proactively can help.
Tags : employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
     SpectorSoft
By: Qualys     Published Date: Jan 11, 2017
When web applications are breached, enormous amounts of sensitive business data can be lost. According to Verizon’s 2014 Data Breach Investigations Report, web application attacks more than doubled in 2013 to become the #1 cause of security incidents
Tags : information security, it compliance, it audit, it security, network security, web application security, application security
     Qualys
By: Absolute Software     Published Date: Jan 29, 2008
Does your PC lifecycle management (PCLM) reflect the issues associated with mobile users? Many organizations face expensive inefficiencies by not managing mobile assets effectively. These inefficiencies include dispersed and manual data collection, and inventory tools that are dependent on a connection to the company network.
Tags : absolute, intel, laptop, saas, managing laptops, pclm, computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm
     Absolute Software
By: McAfee     Published Date: Dec 04, 2014
The attacks continue. The breaches occur. Penalties are assessed. While most universities manage to keep pace with the latest digital trends, they have been far less timely when it comes defending their networks and sensitive data against the latest targeted attacks and threats. This lack of protection is evident as recent headlines expose costly data breaches of student records and research, state and federal compliance violations, and a raft of other privacy and security issues that put students, alumni, staff, and the institutions themselves at considerable risk.
Tags : mcafee, security crisis, higher education, breaches, digital trend, privacy, security issues, sensitive data
     McAfee
By: Butler Technologies     Published Date: Jul 02, 2018
Increasingly complex networks, require more than a one-size-fitsall approach to ensuring adequate performance and data integrity. In addition to the garden-variety performance issues such as slow applications, increased bandwidth requirements, and lack of visibility into cloud resources, there is also the strong likelihood of a malicious attack. While many security solutions like firewalls and intrusion detection systems (IDS) work to prevent security incidents, none are 100 percent effective. However, there are proactive measures that any IT team can implement now that can help ensure that a successful breach is found quickly, effectively remediated, and that evidential data is available in the event of civil and/or criminal proceedings.
Tags : 
     Butler Technologies
By: LogRhythm     Published Date: Sep 19, 2016
In this webinar Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Niemen Marcus, Sony and other breaches. By analyzing the available information about these recent data breaches, from the perspective of detection, the two have assembled an interesting list of security monitoring lessons and ideas. The list includes tips on how to eliminate double false positives, a number of generalized monitoring scenarios, as well as acknowledges the incredible power of monitoring for new executables running for the first time on your environment. If you are concerned about data breaches and you're involved in SIEM and other security monitoring, this is the webinar for you.
Tags : cyber threat, cyber risk, technology, best practices, security, business technology
     LogRhythm
By: VeriSign     Published Date: Feb 10, 2011
In this must read white paper, you will learn about the new advances in attacks that exploit weaknesses of generic SSL to compromise server-server communication and how you can help prevent it.
Tags : verisign, spoofing server, server communication, ssl, data security breach, network security, enterprise network
     VeriSign
By: Oracle     Published Date: May 07, 2018
2017 was a momentous year in security, even though the DDoS landscape appeared to plateau. Maybe it was because Mirai hit so hard at the end of 2016 and the owners of other botnets were retooling to catch up. Maybe it was because news of large data breaches captured so many headlines, drawing the attention of both criminals and the public. Or maybe it is simply due to the cyclical nature of attack popularity that we have seen in the past. No matter the cause, our prediction is that the trend won’t continue in 2018, and it is not time to be complacent. The Mirai botnet is far from played out, as botnet creators are continuing to modify the source code for their individual needs and, with more connected platforms devices than ever, the Internet will continue to offer fertile ground for largescale attacks.
Tags : internet, security, cryptocurrency, data, breaches, botnet
     Oracle
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com