data breach

Results 276 - 300 of 404Sort Results By: Published Date | Title | Company Name
By: NETIQ     Published Date: Mar 12, 2013
File integrity monitoring facilitates the detection of attacks by cybercriminals and insider threats that may result in costly data breaches. It is a critical component of Payment Card Industry Data Security Standard (PCI DSS).
Tags : data security, compliance, pci dss, file integrity monitoring, fim, corporate compliance security, business technology
     NETIQ
By: NetIQ     Published Date: Nov 01, 2012
This paper discusses the importance of file integrity monitoring, which facilitates the detection of attacks by cybercriminals, as well as insider threats that may result in costly data breaches.
Tags : data security, compliance, pci dss, file integrity monitoring, fim, corporate compliance, security, business technology
     NetIQ
By: Citrix ShareFile     Published Date: Apr 14, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Securely store and share your firm's and your clients' tax information data. • Protect your firm's reputation while meeting clients' cyber security expectations. • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing.
Tags : data security, data breach, data encryption, data compliance, accounting, data protection
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Apr 14, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Protect your data and reputation while meeting clients’ cybersecurity expectations • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing • Comply with regulations and ethics codes
Tags : encryption protection, data security, data management, customer protection, data breach, it security, firewall, password protection
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Apr 19, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: • Avoid costly security missteps, leaks, and hacks. • Protect your firm's reputation while meeting clients' cyber security expectations. • Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : data security, data breach, data encryption, data compliance, accounting, data protection
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Apr 19, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: • Avoid costly security missteps, leaks, and hacks. • Protect your firm's reputation while meeting clients' cyber security expectations. • Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : data security, data breach, data encryption, data compliance, accounting, data protection
     Citrix ShareFile
By: CA Technologies     Published Date: Jun 01, 2018
Challenge Businesses today must reduce the risk of security breaches to protect the valuable data within their organizations. At the same time, IT auditors are increasingly enforcing ever more stringent requirements on the business. The bottom line is that privileged accounts and privileged access are being targeted by hackers as a new attack surface and focused on by auditors who are insisting on greater controls around privileged accounts. Opportunity The right privileged access management solution provides comprehensive protection for your missioncritical servers with powerful, fine-grained controls over operating system-level access and privileged user actions. Capable of enforcing access controls on powerful native Superuser accounts—like the UNIX® and Linux® root and Microsoft® Windows® administrator—this system-level, host-based privileged access management solution controls, monitors and audits privileged user activity, improving security and simplifying audit and compliance. B
Tags : 
     CA Technologies
By: Delphix     Published Date: Sep 10, 2014
Most data masking products can create masked data copies but not distribute or update them, resulting in projects that fail to live up to expectations. Learn why Delphix’s Agile Masking solution is the only product that solves both masked data creation and delivery challenges.
Tags : secure data, digitization, data breaches, privacy regulations, sensitive data, internal, customer information, application landscapes
     Delphix
By: Quocirca     Published Date: Jul 27, 2009
With data breaches widespread, no organisation can afford to be complacent, but most data losses are avoidable. Many of the breaches making headline news are caused by the loss or theft of laptops and other portable devices. To protect themselves from financial and reputational damage, encryption technologies can reduce risks by ensuring the information on such devices is secure when users are on the move. They can also add value by allowing the secure sharing of information among authorised users and by enabling more secure remote working.
Tags : quocirca, encryption, security, information protection, compliance, data management
     Quocirca
By: IBM     Published Date: Oct 10, 2013
We all know how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly. But what can you do about it? The IBM white paper “Responding to—and recovering from—sophisticated security attacks” details four proactive steps that you can—and should—take now to help keep your organization safe: prioritize your business objectives and set your risk tolerance; protect your organization with a proactive security plan; prepare your response to the inevitable sophisticated attack and promote and support a culture of security awareness. Read the white paper to learn how to help keep your organization safe from sophisticated security attacks and find out how IBM can help.
Tags : security, data security, networks, branding, attacks, security, security breach, safeguarding, infastructure, risk, risk tolerance, security attacks, it management, data management, business technology
     IBM
By: Google     Published Date: Aug 23, 2018
"From APIs to employee-owned smartphones, there are more access points to corporate data than ever before. Have businesses updated their security strategies to reflect this explosion of new targets for potential breaches? In June 2017, Google commissioned Forrester Consulting to examine how security experts think about endpoint security and learn how the cloud is helping businesses address new vulnerabilities. Download the Forrester report and find out more."
Tags : 
     Google
By: ThreatTrack Security     Published Date: Jan 22, 2015
Stillwater Medical Center: Healthcare provider with 1,000 employees chooses VIPRE after its old antivirus kept crashing systems, disrupting operations and failing to protect against malware infections. Learn how this hospital cured its antivirus ills with VIPRE.
Tags : threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, vipre, hospital
     ThreatTrack Security
By: IBM     Published Date: Oct 26, 2017
The right identity and access management solution can integrate with a healthcare provider’s EMR system to help keep sensitive medical data safe—and keep the organization compliant. It can provide valuable insights and visibility into accounts, access privileges and entitlements, across the wide range of users. By closing the gaps in identity protection, organizations can fight the threats of inadvertent misuse and intentional theft that may lead to security breaches.
Tags : healthcare, electronic medical records, access management solutions, identity protection, medical data
     IBM
By: Worldpay     Published Date: Apr 29, 2015
In 2014, the UK saw online sales exceed £10bn per month. For small businesses, getting online is a great way to increase revenue. However, there’s no escaping the fact that small e-retailers are most at risk of suffering a data breach and that breaches are increasing. It is your responsibility to keep the card payment data of your customers safe and a failure to secure your systems could be a costly mistake which leads to penalty fines, lost custom and bad publicity. Worldpay is the leading payments provider in the UK and Europe. Whilst Worldpay has fewer businesses suffering data breaches, compared to our market size, we have a unique oversight on most UK card data breaches. We have compiled our insight and advice into this guide so all businesses, new or old, can ensure they are prepared.
Tags : ecommerce, payments, online payments, small business, fraud, security, card payments, card data, pci dss, e-retail, data breach, hacking, sql injection, malicious web shells, cyber security, sme
     Worldpay
By: McAfee EMEA     Published Date: Mar 14, 2018
Use of cloud computing services continues to grow rapidly as organizations migrate business applications and data to cloud-based software, platform and infrastructure services. Gartner estimates 2017 will see growth of 18% in spending on public cloud services and that cloud adoption will infuence more than 50% of IT spending through 2020. Deloitte Global predicts that by the end of 2022 more than half of all IT spending will go to IT-as-a-service providers. In the 2016 edition of this survey, 56% of the security professionals responding said limitations on access to collect incident response data and evidence for forensic analysis was a key challenge to securing the cloud. Sixty-two percent said they were concerned about unauthorized access by outsiders, and 59% said they worried about access by other cloud tenants. Of the 10% who reported being breached, half blamed stolen credentials or compromised accounts.
Tags : 
     McAfee EMEA
By: LogRhythm     Published Date: Jun 19, 2018
As in years past, 2017 was packed with stories of cyber security failure. Between sophisticated attackers, lack of proper security monitoring and controls implementation, and devastating data breaches that may have arisen from these scenarios, it’s easy to see that we still face serious challenges in the security arena, with potentially serious consequences. Why are we continually seeing these issues? Many security professionals readily admit that we don’t have the staff, training and breadth of coverage in our security controls to adequately combat the attackers today. How is this happening when we’re spending so much money and time on cyber security?
Tags : logrhythm, sans, cloudai, ueba
     LogRhythm
By: McAfee     Published Date: Oct 28, 2014
SANS recently surveyed incident response (IR) teams to get a clearer picture of what they're up against today. The results are in; most organizations lack formalized IR plans, they expressed a need to collect and correlate threat intelligence and SIEM tools are their focus for improving IR capabilities.
Tags : siem, incident response, ir capabilities, ir obstacles, threat intelligence, detection and remediation, data breach, security
     McAfee
By: BMC     Published Date: Nov 19, 2018
In this book, you learn how SecOps can transform your organization’s security and operations teams to enable a more effective enterprise security posture.
Tags : bmc, bmc software, secops, security operations, cyberattacks, cyber criminals, hacking, data breach
     BMC
By: BMC ASEAN     Published Date: Jan 02, 2019
Bring security and operations together to protect your organization! Collaborative workflow processes that eliminate friction between security and operations teams sharply lower the risk of data breaches and operational downtime. Enterprises can advance their business agenda by minimizing communications breakdowns that leave the organization vulnerable to cyberattacks. This book shows you how!
Tags : 
     BMC ASEAN
By: Ecora Software     Published Date: Aug 15, 2007
High-profile data losses are grabbing more and more headlines every week, threatening the reputation, customer base, and overall bottom line of organization whose systems have been exploited. In addition to this lurking threat, now organizations face potential fines for PCI non-compliance from VISA, beginning in September 2007. Ecora Software will provide you with the information you need to proactively address PCI compliance and, of equal importance, minimize your risk of a costly data breach.
Tags : pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
     Ecora Software
By: HP     Published Date: Jul 29, 2008
The data residing on your storage systems and media, data-at-rest, presents serious security concerns. Regulations and various mandates around the world are putting the burden on companies and government entities to protect the private information they store. Increasingly, companies are being required to publicly disclose breaches that put individuals private data at risk, be it a customer, employee, shareholder, partner, or other stakeholder.
Tags : data security, database security, securing data, customer data, consumer data, pci, cardholder data, mission critical
     HP
By: Infoblox     Published Date: Jun 18, 2015
This in-depth white paper from the SANS institute will bring you up to speed on today’s most dangerous vulnerability. In it, you will learn about: • How DNS works, and why, if unprotected, it can put your network at risk • The different kinds of DNS attacks—and who’s been hit by them • Major compliance frameworks that address the problem • Effective governance and best practices
Tags : infoblox, dns, attacks, effective governance, sans institute, compliance frameworks
     Infoblox
By: SafeNet     Published Date: Jun 04, 2013
To learn more about the current state of the data breach epidemic and how to implement a strategy to prevent it, read SafeNet's Secure Breach Manifesto.
Tags : data breach, data security, it security
     SafeNet
By: HP - Enterprise     Published Date: Aug 31, 2011
New headlines provide ongoing evidence that IT Security teams are losing the battle against attackers, reinforcing the need to address the security of enterprise applications.This Analyst Insight reviews several practical steps you can take to get started now.
Tags : "application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp, software vulnerabilities, critical application vulnerability, hp fortify, aberdeen, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, it security, alm, "application lifecycle management"
     HP - Enterprise
By: Symantec     Published Date: Jun 18, 2015
Learn how to properly secure your enterprise in the cloud and see why it is important to safely move your organization to the cloud.
Tags : mobile devices, enterprise in the cloud, data breach, centralized servcers, security, enterprise applications
     Symantec
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com