data breach

Results 51 - 75 of 410Sort Results By: Published Date | Title | Company Name
By: Panasonic     Published Date: Apr 23, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum. Federal agencies are no strangers to cybersecurity attacks, and several recent high-profile breaches involving mobile devices demonstrate ongoing vulnerabilities in government’s expanding network of endpoints. This issue brief describes what can be done to protect devices, data and networks, including multi-factor authentication to authorization controls and user education.
Tags : 
     Panasonic
By: Kaseya     Published Date: May 13, 2015
Banking systems are inherently distributed in multiple branch and ATM locations, as well as home banking over the internet. As the number of access points grows, so does the complexity of IT systems management. Systems need to be readily available and productive yet secure and protected from data-breach.
Tags : kaseya, hybrid, cloud, management, msp, mobile, big data, finance
     Kaseya
By: ThreatTrack Security     Published Date: May 21, 2015
Watch this webinar to learn how to win the battle against Advanced Persistent Threats.
Tags : persistent threats, cyberattacks, security, data breach, it management, knowledge management, data management
     ThreatTrack Security
By: Globalscape     Published Date: Nov 14, 2016
Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is “no,” then your sensitive data may be vulnerable. In this guide from Globalscape, you’ll learn: • What shadow IT is and the drawbacks • Signs of a shadow IT problem • How to reduce shadow IT
Tags : globalscape, shadow it, data transfer methods, data breach, security, enterprise applications, business technology
     Globalscape
By: LifeLock     Published Date: May 10, 2016
A data breach can happen at any time. Be ready to respond. Download now and learn the best practices for handling a company data breach. See how you can protect your organization!
Tags : 
     LifeLock
By: Focus     Published Date: Jan 06, 2011
Mitigate the risks of data breach and loss with these best practices for managing security on mobile devices.
Tags : amy babinchak, best practices, bob egan, expert content, information technology, it security, josh lipton, ken wineberg
     Focus
By: Infinidat EMEA     Published Date: May 14, 2019
The Increased Business Risk from a Data Breach
Tags : 
     Infinidat EMEA
By: FICO     Published Date: Feb 06, 2018
The FICO® Enterprise Security Score measures the likelihood that you will suffer a data breach in the coming 12 months. To deliver the FICO Enterprise Security Score, we access billions of external data points at internet scale and apply our analytics to give you an empirically derived score. You can measure the cybersecurity risk of your organization, or any organization you want to work with, to see the risk you are inheriting from your supply chain. We provide the information behind your cybersecurity score so you can see where you need to take action, and you can measure the effect of improvements on your overall cybersecurity posture.
Tags : grow, optimize, business, enterprise, security, data, breach
     FICO
By: Qualys     Published Date: Jun 30, 2016
Few would argue with the statement that security is a top priority for IT departments at companies large and small today. Data is the currency of the digital age and the lifeblood of organizations, so strategies to protect corporate data are growing in importance and are now a topic of C-suite consideration. So with high-profile data breaches continuing to occur across industries, security leaders are revamping their strategies to keep pace.
Tags : security, cloud, cloud management, data security, it management
     Qualys
By: Cisco     Published Date: Dec 19, 2016
Today’s threat landscape has forced us, once again, to evolve how we think about and deliver effective security to protect endpoints (PCs, Macs, Linux, mobile devices, etc). Malware today is either on an endpoint or it’s headed there. Advanced malware is dynamic, can compromise environments from an array of attack vectors, take endless form factors, launch attacks over time, and can quickly exfiltrate data from endpoints. Such malware, including polymorphic and environmentally aware malware, is very good at masking itself and evading traditional security tools, which can lead to a breach. As a result, it’s no longer a question of “if” malware can penetrate defenses and get onto endpoints, it’s a question of “when”.
Tags : 
     Cisco
By: Delphix     Published Date: May 03, 2016
High-profile data breaches continue to make headlines as organizations struggle to manage information security in the face of rapidly changing applications, data centers, and the cloud. Against this backdrop, data masking has emerged as one of the most effective ways to protect sensitive test data from insider and outsider threats alike. While masking is now the de facto standard for protecting non-production data, implementing it alongside virtual data technologies has elevated its effectiveness even further.
Tags : 
     Delphix
By: LifeLock     Published Date: Sep 12, 2016
It only takes one stolen laptop, one employee’s USB stick, one hacker, one virus, or one careless error to compromise your company’s reputation and revenue. The threat of data breach is real and it’s critical that your company is prepared. A thorough plan that can be executed quickly is essential to comply with relevant regulations, maintain customer loyalty, protect your brand and get back to business as soon as possible.
Tags : est practices, identity theft, security, protection
     LifeLock
By: CA Technologies     Published Date: Apr 06, 2017
Privileged identity, accounts and credentials are core, critical assets for enterprises that must be highly protected through a combination of technology and processes which are enabled by privileged access management. Delivering that protection is instrumental in breaking the data breach kill chain, helping to prevent attacks and mitigating the impact of those that do occur.
Tags : data breach, it security, malicious spyware, security management, cloud security, system protection
     CA Technologies
By: CA Technologies     Published Date: Aug 26, 2016
It’s impossible for a day to pass in which we don’t hear news of yet another data breach, with its resulting loss of proprietary secrets, financial records or personal information. These incidents span all sectors of the economy: commerce, education and government
Tags : 
     CA Technologies
By: Brother     Published Date: Mar 08, 2018
The last decade has seen many exciting advances in connectivity accelerated by the near universal availability of smartphones and tablets – leading to a highly interconnected world. The security of networks - and the businesses and individuals that rely on them - has become top of mind for the IT Security professionals who are responsible for ensuring the safety of the data and the networks where this information is utilized. As high-visibility security breaches occur - affecting ecommerce, banking, retail and other industries - the critical importance of the security of the infrastructure these businesses rely on continues to grow. Security in the workplace is a daily fact of life. From using ID cards to control physical access, to entering passwords to join the network, to using software to monitor and prevent unauthorized access, all are routinely used to protect critical assets and information. However, there is one key area where many organizations still have potential vulnerabili
Tags : network security, security breaches, pci, dss, hippa
     Brother
By: McAfee EMEA     Published Date: Nov 15, 2017
The pressures of speed, efficiency, and cost will push more applications and data outside the trusted network and into a service provider’s clouds, where those benefits can be realized. The growth of cloud services and movement of sensitive data between private and public clouds means that those services will become increasingly valuable as targets of attack. As enterprises cloud-enable their operations, gaps in control, visibility, identity, and security are the most likely paths to data breaches.
Tags : cloud, optimization, speed, efficiency, costs, applications, data, services
     McAfee EMEA
By: Intralinks     Published Date: Jan 16, 2015
The increased mobility of the workforce is changing the way we work. Business users want the flexibility to share and collaborate on content that drives their business while IT needs to ensure the security of that data, no matter where it goes. An effective enterprise collaboration solution must consider people, processes and technologies to be effective, but where to begin? This comprehensive Buyer’s Guide offers guidance on how to develop your organization’s requirements with regard to: Risk management – avoiding data breaches and loss of information that can result in non-compliance Business productivity - allowing for secure collaboration while enabling teams to work anywhere on any device IT efficiency - supporting the full breadth of external business content requirements while integrating with existing applications and protocols This Buyer’s Guide offers a holistic approach for your evaluation process by examining the granular aspects of enterprise file sharing, as well as i
Tags : collaboration solutions, risk management, business productivity, it efficiency, business users, enterprise applications
     Intralinks
By: illusive networks     Published Date: May 18, 2016
In 2015, the average cost of a data breach was $3.79 million, a 23% increase from 2013. While a data breach of just average magnitude could be enough to cripple numerous companies, there are still organizations failing to take the necessary cyber security precautions.
Tags : 
     illusive networks
By: ALE     Published Date: Jan 10, 2019
Campus Cybersecurity is a perennial ‘top of mind’ topic for Higher Education. For the second time in three years, information security topped Educause’s annual Higher Ed CIO Top 10 IT Issues survey. This should come as no surprise according to the latest Verizon Data Breach Investigations Report (DBIR). The report, which shows cybercriminal activity trending upwards, identifies the three most targeted industries as Financial and Insurance, Healthcare, and Education. To find out more, download this whitepaper today.
Tags : 
     ALE
By: IBM     Published Date: Apr 20, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : device management, data solutions, system solutions, data breach, mobile management
     IBM
By: IBM     Published Date: Apr 24, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : device management, data solutions, system solutions, data breach, mobile management
     IBM
By: QTS Data Centers     Published Date: Mar 31, 2015
To keep pace with new business demands, rising customer expectations, and emerging technologies, IT leaders are realizing an important opportunity: infrastructure outsourcing. These services, including colocation, hosting, and cloud computing, give IT organizations the flexibility and agility to better serve the needs of the business.
Tags : qts, cloud, security, data transactions, cio report, cyber threats, security breaches, it leaders
     QTS Data Centers
By: Okta     Published Date: May 12, 2017
This guide will explain how Okta Adaptive Multifactor Authentication (MFA) provides the security that IT needs, while also providing the simplicity end users want.
Tags : 
     Okta
By: Cisco EMEA     Published Date: Nov 13, 2017
In the not so distant past, the way we worked looked very different. Most work was done in an office, on desktops that were always connected to the corporate network. The applications and infrastructure that we used sat behind a firewall. Branch offices would backhaul traffic to headquarters, so they would get the same security protection. The focus from a security perspective was to secure the network perimeter. Today, that picture has changed a great deal.
Tags : malware, ransomware, compromised accounts, malicious insiders, visibility, coverage, data breaches, compliance
     Cisco EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com