security breach

Results 176 - 200 of 355Sort Results By: Published Date | Title | Company Name
Published By: Niara     Published Date: Jan 27, 2016
Download this white paper to learn the must-have tactics organizations can use to quickly detect attacks on the inside and severely limit the damage they can do.
Tags : 
advanced attacks, attack detection, cybercriminals, perimiter defenses, security breach, learning-based security analytics, security monitoring, behavioral analytics, machine learning, user behavior analytics, user and entitiy behavior analytics
    
Niara
Published By: Delta Risk     Published Date: Jun 07, 2016
Nowhere else could that wise advice be more relevant than in contemplating the effects of cyber attacks on financial institutions. As stated in a recent issue of the FDIC’s Supervisory Insights, the risks presented by cyber attacks have become “one of the most critical challenges [in the last decade] facing the financial services sector due to the frequency and increasing sophistication of cyber attacks.” In just a year’s time, from 2014 to 2015, the occurrence of security incidents increased 38 percent as reported in a survey of 10,000 security, IT, and executive personnel. Just as concerning, the attackers perpetrating these breaches were able to compromise the victim organization within a matter of minutes in 60 percent of cases.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
Delta Risk
Published By: Delta Risk     Published Date: Jun 07, 2016
Regardless of how many security controls are placed on a network and the components that go into making a network operate, there will always be vulnerabilities in a connected world. So, what do you do in an environment that allows for such risk of compromise? One of the best methods of protecting organizations is by ensuring that response capabilities are effective and efficient, and one of the most valuable steps in strengthening a response capability is learning from others’ experiences. This white paper discusses the pain points that organizations grapple with when responding to incidents, and how they can address them.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
Delta Risk
Published By: Delta Risk     Published Date: Jun 07, 2016
Recent high profile, high impact cyber breaches at some of the largest financial institutions in the United States have highlighted the fact that boards of directors need to take an active role in the management of cyber risk. This Viewpoint offers the Delta Risk perspective on how boards should engage in the management of cyber security risks, stressing four priority activities.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
Delta Risk
Published By: Delta Risk     Published Date: Sep 21, 2016
This white paper offers the Delta Risk perspective on how boards, particularly those of financial services firms, should engage in managing cyber security risks, particularly in four key areas.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
Delta Risk
Published By: Delta Risk     Published Date: Sep 21, 2016
Nowhere else could that wise advice be more relevant than in contemplating the effects of cyber attacks on financial institutions. As stated in a recent issue of the FDIC’s Supervisory Insights, the risks presented by cyber attacks have become “one of the most critical challenges [in the last decade] facing the financial services sector due to the frequency and increasing sophistication of cyber attacks.” In just a year’s time, from 2014 to 2015, the occurrence of security incidents increased 38 percent as reported in a survey of 10,000 security, IT, and executive personnel. Just as concerning, the attackers perpetrating these breaches were able to compromise the victim organization within a matter of minutes in 60 percent of cases.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
Delta Risk
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Securely store and share your firm's and your clients' tax information data. • Protect your firm's reputation while meeting clients' cyber security expectations. • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing.
Tags : 
data security, data breach, data encryption, data compliance, accounting, data protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Protect your data and reputation while meeting clients’ cybersecurity expectations • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing • Comply with regulations and ethics codes
Tags : 
encryption protection, data security, data management, customer protection, data breach, it security, firewall, password protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 19, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: • Avoid costly security missteps, leaks, and hacks. • Protect your firm's reputation while meeting clients' cyber security expectations. • Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : 
data security, data breach, data encryption, data compliance, accounting, data protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 19, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: • Avoid costly security missteps, leaks, and hacks. • Protect your firm's reputation while meeting clients' cyber security expectations. • Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : 
data security, data breach, data encryption, data compliance, accounting, data protection
    
Citrix ShareFile
Published By: LifeLock     Published Date: Jan 17, 2018
In the spring of 2015, 4 employees from the company’s primary manufacturing plant discovered that fraudulent tax returns had been filed using their names, addresses and social security numbers. These were random incidents and not the result of a company data breach. After repeated attempts involving many hours trying to personally remediate the problem, the employees turned to the head of HR for aid in resolving the situation.
Tags : 
    
LifeLock
Published By: BMC     Published Date: Nov 19, 2018
In this book, you learn how SecOps can transform your organization’s security and operations teams to enable a more effective enterprise security posture.
Tags : 
bmc, bmc software, secops, security operations, cyberattacks, cyber criminals, hacking, data breach
    
BMC
Published By: Oracle     Published Date: Aug 19, 2016
Research conducted by the Economist Intelligence Unit shows how firms can improve data security. Certain firms consistently demonstrate success in reducing breaches across all major forms of cyber-attack. 32% of companies named their top security priority as adopting a proactive data defense strategy. Discover eight steps to reduce vulnerability to cyber-attack.
Tags : 
    
Oracle
Published By: Kaspersky Lab     Published Date: Dec 12, 2014
Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task. Download Part I: Reducing Employee and Application Risks.
Tags : 
kaspersky, it security, best practice, hygiene, sensitive information, security breach, secure passwords
    
Kaspersky Lab
Published By: Kaspersky Lab     Published Date: Dec 12, 2014
Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task. Download Part II: Reducing Mobile, Web, and Social Media Risks.
Tags : 
kaspersky, it security, best practice, hygiene, sensitive information, security breach, secure passwords, mobile risks, web risks, social media risks
    
Kaspersky Lab
Published By: NeoSpire Managed Hosting     Published Date: Sep 01, 2009
In today's economy, companies are trying to assess if they can afford to become PCI compliant. What many of those same companies forget to consider whether they can afford not to be compliant. Since 2007, merchants who were found to be non-compliant with PCI DSS faced fines of $5,000 to $25,000 per month from Visa. It may seem expensive for merchants to install and maintain new security measures to become PCI compliant and validated, but these costs are only a fraction of what it would cost a company to be found in non-compliance or suffer a data breach. Learn more about PCI DSS compliance and how NeoSpire Managed Hosting can help.
Tags : 
pci compliance, neospire, pci dss faced fines, datalossdb.org, heartland payments, tjx companies, breach cardholder data, hardware, and software, achieving pci standards compliance, protect against security breaches
    
NeoSpire Managed Hosting
Published By: NetIQ     Published Date: Jul 27, 2011
Listen in as Andras Cser, Principal Analyst at Forrester Research, speaks about trends he is seeing in the Identity & Access Management (IAM) market, and specifically about the challenges and benefits of user provisioning.
Tags : 
active directory, ad administration, netiq, compliance, active directory administration, user provisioning, reduce administrative priviledge, itpa, it process automation, security, active directory management, data protection, information security, identity management, identity and access management, staffing, provisioning, threat, iam, privilege delegation
    
NetIQ
Published By: NetIQ     Published Date: Dec 08, 2011
"Stop the Breach before It Happens: Easy, Smart, and Powerful Security Management Solutions" presented by Garve Hays:
Tags : 
security, breach, management, security management, event, infrastructure, threat, threat detection, threat remediation, compliance
    
NetIQ
Published By: CenturyLink     Published Date: Nov 18, 2011
See how Payment Card Industry compliance can keep customer data safe and strengthen your business.
Tags : 
centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles, voip, customers, kosks, mobile, applications, security, breaches, data, cards
    
CenturyLink
Published By: CDW     Published Date: Jul 08, 2015
Your data is at risk. The threat of data breaches has grown larger than ever before, as attackers become more numerous and sophisticated. And as data becomes more precious, the damage that can be done by a data breach has increased greatly.
Tags : 
security, data protection, dlp, data breach, vulnerability management
    
CDW
Published By: Dell SecureWorks     Published Date: Sep 09, 2013
10 Tips to Help You Minimize the Duration and Impact of a Security Breach
Tags : 
dell, dell secureworks, risk consulting, cyber security, security, security breach, counter threat unit
    
Dell SecureWorks
Published By: Dell SecureWorks     Published Date: Sep 13, 2013
Accelerating Incident Response: How Integrated Services Reduce Risk and the Impact of a Security Breach
Tags : 
dell, dell secureworks, security breach, incident response
    
Dell SecureWorks
Published By: NAVEX Global     Published Date: Nov 19, 2013
Is your organization benefiting from the full ROI of automated policy and procedure management? Policies and procedures are the building blocks of every organization. This eBook offers articles geared toward managing the policy lifecycle from drafting and validating to approving and implementing, as well as increasing security and important steps toward protecting against data breaches.
Tags : 
compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance
    
NAVEX Global
Published By: Cyveillance     Published Date: Apr 03, 2015
In this white paper, we recap notable trends and events in information security from 2014 and look forward to what information security professionals should expect in 2015. The past year was a landmark one in the information security field, with massive data breaches capturing the public’s attention, powerful bugs causing headaches for IT teams and end users, DDoS attacks breaking records, and phishing remaining a general annoyance – or worse – for all Internet users. In this whitepaper, we discuss these trends as well as key areas of concern for 2015, including: - The impact of the Internet of Things - The growing importance of threat intelligence - The increasing influence of BRICS nations - The evolution of encryption standards - The changing role of the CISO
Tags : 
information security threat, information security, protection, security breach, internet security
    
Cyveillance
Published By: Cyveillance     Published Date: Apr 06, 2015
In this white paper, we examine notable trends and events in physical security from 2014 and assess what security professionals should expect in 2015. 2014 was truly an unpredictable year in the physical security and executive protection worlds, as large scale events targeted for disruption were executed relatively smoothly, while unforeseen developments in Ukraine and the Ebola outbreak caught many off guard. Looking ahead to 2015, we predict that local issues will continue to gain global importance, threat actors and activists will find new ways to utilize social media to spread their messages, and the lines between physical and digital threats will continue to converge. We also highlight ongoing developments in France, Mexico, Ukraine, and Germany.
Tags : 
information security threat, information security, protection, security breach, internet security
    
Cyveillance
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: