Share us:
 

threat report

Results 226 - 246 of 246Sort Results By: Published Date | Title | Company Name
Published By: Websense     Published Date: Feb 26, 2013
Miercom conducted an independent third-party validation of the Websense TRITON Web Security Gateway Anywhere (WSGA) version 7.7.3, with comparisons to several major competitive products evaluated in this review.
Tags : 
security, appliance, detection, blocking, malware, threats, sandboxing, forensic reporting, websense, test, study, access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, business continuity, compliance
    
Websense
Published By: SAS     Published Date: Aug 03, 2016
Financial institutions (FIs) must support the channels and services that consumers demand in order to remain competitive with each other and with disruptive competitors. To that end, supporting account opening, delivering new transactional features, and facilitating payments through digital channels have become table stakes. Unfortunately, the speed and convenience that these capabilities afford is a benefit to consumers and fraudsters alike. To successfully prevent fraud while retaining the benefits of offering digital financial services, FIs must understand how fraudsters are exploiting these capabilities and fight fraud with customer experience in mind.
Tags : 
finance, best practices, digital channels, demand, financial services, fraud, customer experience, business analytics, business management
    
SAS
Published By: ESET, LLC.     Published Date: Apr 27, 2011
Global Threat Trends is a monthly report created by ESET that includes a review of the current events in the world of information security and the top ten threats of the month.
Tags : 
eset, blackhat japanning, global threat report, david harley, urbanschrott, disaster scam, malware reporting, inf/autorun, win32/conficker, win32/psw.onlinegames, win32/sality, bflient, autoit, tifaut.c, spy.ursnif.a, anti spam, anti spyware, anti virus, firewalls, internet security
    
ESET, LLC.
Published By: ESET, LLC.     Published Date: May 16, 2011
Just recently a very stereotypical 419 was put together, using the Libyan crisis as bait and "government funds" as hook. Yep, every time a dictator is deposed or dies, someone seizes the opportunity to offer his fortune. Read this report for details.
Tags : 
eset, global threat report, april 2011, 419, scam, cybercrime, anti spam, anti spyware, anti virus, email security, internet security, security management, web service security
    
ESET, LLC.
Published By: ZScaler     Published Date: Dec 13, 2011
Leveraging a combined view of billions of daily web transactions-spanning millions of enterprise users across over 140 countries - Zscaler ThreatLabZ delivers the State of the Web Q3 2011 Report.
Tags : 
blue coat, proxy sg, url filtering, web 2.0, cloud security, proxy av, xss, vpn, email gateway, web gateway, mobile device, saas, gre tunnels, proxy chaining, active directory, dlp, cookie theft, application integration, application performance management, best practices
    
ZScaler
Published By: FireEye     Published Date: Sep 13, 2012
This report provides an overview of the current threat landscape, evolving advanced malware and advanced persistent threat (APT) tactics, and the level of infiltration seen in organizations' networks today.
Tags : 
fireeye, threat report, cybercriminals, apt, 1h 2012, security
    
FireEye
Published By: Dell SecureWorks     Published Date: May 28, 2013
Examining threats over an extended period of time reveals current trends as well as clues about the future direction of attacker activity.
Tags : 
software vulnerabilities, global-scale threats, distributed denial of service attacks, advanced persistent threats, mobile threats, threat scenarios, attack trends, future attacks, security
    
Dell SecureWorks
Published By: Norse     Published Date: Apr 18, 2014
Learn about the epidemic of compromises that are taking place at healthcare organizations due to cyberattacks and see what steps your organization should take to protect against these threats.
Tags : 
health care, cyberattacks, compromised devices, norse, epidemic of compromises, protection against threats, security, it management, enterprise applications
    
Norse
Published By: Cisco     Published Date: Aug 18, 2014
You have to know the threats to stop them. It's not a question of if – but when and how – Internet criminals will get into your network. The Cisco 2014 Annual Security Report highlights the most current security concerns, such as shifts in malware, trends in vulnerabilities, and the revival of distributed denial-of-service (DDoS) attacks.
Tags : 
security report, internet criminals, concerns, malware, denial-of-service, attacks, ddos, network, vulnerabilities, security, web service security
    
Cisco
Published By: AlienVault     Published Date: Mar 30, 2016
Get Real-Time Threat Detection Starting on Day 1 with AlienVault USM Download a free, 30-day trial of AlienVault USM to experience the power of our all-in-one security platform. You’ll see how easy it can be to protect and defend against today’s threats with all of the essential security tools you need. Experience how USM makes it easy to: • Discover all IP-enabled assets on your network • Identify vulnerabilities like unpatched software or insecure configurations • Detect malware like botnets, trojans & rootkits • Speed incident response with remediation guidance for every alert • Generate accurate compliance reports for PCI DSS, HIPAA and more Download Your Free Trial Now!
Tags : 
    
AlienVault
Published By: Symantec     Published Date: Jul 29, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security, website protection, website threats, symantec, norton
    
Symantec
Published By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : 
venafi, ssh keys, vpn credentials, digital certificates
    
Venafi
Published By: Black Duck Software     Published Date: May 18, 2016
Read this case study to learn how ScienceLogic employs Black Duck to: - Identify open source throughout their code base - Determine possible license violations and conflicts - Know when new threats are reported
Tags : 
black duck, science logic, open source, visibility, secutiry, software, security, enterprise applications
    
Black Duck Software
Published By: LogRhythm     Published Date: Jun 19, 2018
Globally, sophisticated cyber-attacks are compromising organizations at an unprecedented rate and with devastating consequences. Modern attackers, including criminal organizations, ideological groups, nation states and other advanced threat actors are motivated by a wide range of objectives that include financial gain, industrial espionage, cyber-warfare, and terrorism. These attacks are often very expensive for compromised organizations, costing each company an average of USD $7.7M.1 1 Ponemon 2015 Cost of Cyber Crime Study 2 CyberEdge 2016 Cyberthreat Defense Report 3 Symantec, Underground black market: Thriving trade in stolen data, malware, and attack service. November 20, 2015; Medscape, Stolen EHR Charts Sell for $50 Each on Black Market, April 28, 2014 4 Deloitte, Beneath the Surface of a Cyberattack, 2016 The Modern Cyber Threat Pandemic 3 The odds that your organization will be compromised are high. In fact, a recent report indicates that 76 percent of surveyed organizatio
Tags : 
data, breaches, organizations, global
    
LogRhythm
Published By: IBM     Published Date: Oct 16, 2017
This white paper examines how some of the ways organizations use big data make their infrastructures vulnerable to attack. It presents recommended best practices organizations can adopt to help make their infrastructures and operations more secure. And it discusses how adding advanced security software solutions from IBM to their big-data environment can fill gaps that big-data platforms by themselves do not address. It describes how IBM® Security Guardium®, an end-to- end solution for regulatory compliance and comprehensive data security, supports entitlement reporting; user-access and activity monitoring; advanced risk analytics and real-time threat detection analytics; alerting, blocking, encryption and other data protection capabilities, as well as automated compliance workflows and reporting capabilities, to stop threats.
Tags : 
security, big data, ibm, data protection
    
IBM
Published By: Lookout     Published Date: Dec 09, 2016
A key takeaway from this research is that adding mobile threat defense to EMM is the next step for enterprises looking to strengthen their mobile security posture. Get your copy of this report to learn more about how EMM and mobile threat defense deliver more than the sum of their parts.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Dec 13, 2016
A key takeaway from this research is that adding mobile threat defense to EMM is the next step for enterprises looking to strengthen their mobile security posture. Get your copy of this report to learn more about how EMM and mobile threat defense deliver more than the sum of their parts.
Tags : 
mobile security, device encryption, enterprise mobility management, integration, mobile indetity, security management
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2017
This report examines enterprise security threats for iOS and Android. While Android has higher consumer market share, iOS commands more market share in the enterprise, accounting for 72% of enterprise mobile activations in Q1 2015 compared to Android’s 26% activation share.
Tags : 
enterprise, mobile, ios, android, lookout
    
Lookout
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
SE Labs tested CylancePROTECT® in an offline environment against major threats that subsequently appeared in the wild. The test explores the product’s ability to prevent new threats from attacking endpoint systems successfully. CylancePROTECT contains technology designed to identify and block malware using what it claims to be an “artificial intelligence” (AI) model. This model can be updated over time. However, in this test we used the model created in May 2015 and did not permit further updates so that the software was unable to receive new models or edit the existing one. The test exposed systems protected by this older version of CylancePROTECT to very impactful threats discovered and reported widely after May 2015. In this way, the test shows to what extent the product was able to predict how future threats would appear. This “Predictive Advantage” (PA), the advantage that users of the product have against future adversaries, is presented in this report.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Forrester Consulting was commissioned to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Cylance's advanced threat protection solution, CylancePROTECT®, and its deployment and configuration services, ThreatZero™. The study aims to provide readers with a framework to evaluate the potential financial impact of CylancePROTECT and ThreatZero on their organizations, which will improve customer success with advanced cybersecurity and antivirus protection solutions. To better understand the benefits, costs, and risks associated with an investment in Cylance, Forrester interviewed the Chief Information Security Officer for a Large State County Government, who has used the solutions for over a year. Cylance provides a new-generation, predictive, cybersecurity, and malware prevention solution that leverages artificial intelligence to prevent malware from executing on endpoints in real time. This is usually implemented with ThreatZero, which is a continuous professional service program rendered by Cylance for users of CylancePROTECT. ThreatZero guides through the planning, implementation, integration, and ongoing optimization of the solution. This often includes end user education, training, and support to totally eliminate endpoint threats and incidents. With CylancePROTECT and ThreatZero, the organization was able to reduce security breaches to almost zero, catching malware before it ever gained access to public records. Relative to their previous endpoint protection, this significantly reduced costs from remediation/reimaging and incidence response. Additionally, IT and security employees’ productivity were boosted. Read more in the full TEI report.
Tags : 
economic, cylance, roi, enterprises
    
BlackBerry Cylance
Published By: BeyondTrust     Published Date: Apr 04, 2019
The WannaCry ransomware attack in May 2017 crippled the UK’s National Health Service (NHS) and disrupted a range of organizations across 150 countries. Despite being a relatively unsophisticated attack, WannaCry was able to make such a global impact due to preventable vulnerabilities that had largely gone unaddressed. There were many more attacks in 2017, including high-profile breaches at Uber and Equifax, where heeding cyber-security recommendations may have reduced the impact and fallout. The scale and sophistication of cyber-attacks is not slowing down – ranging from phishing scams to cryptocurrency-based cyber-attacks, to statesponsored attacks on industrial control systems. These attacks present an ever growing challenge and serve as a reminder that organizations cannot afford to be complacent in the face of cyber threats. We’re living in a time when cyberattacks are a matter of when, not if, and security professionals must focus on mitigating their extent and damage. Our 2018 re
Tags : 
    
BeyondTrust
Start   Previous    1 2 3 4 5 6 7 8 9 10     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by Boris Agranovich.

Badges  |  Report an Issue  |  Terms of Service