attacks

Results 351 - 375 of 1085Sort Results By: Published Date | Title | Company Name
By: VMware     Published Date: Oct 20, 2016
View this infographic to find out how to stop data center attacks before they happen.
Tags : 
     VMware
By: VMware     Published Date: Oct 20, 2016
View this infographic to find out how to stop data center attacks before they happen.
Tags : 
     VMware
By: Mimecast     Published Date: Oct 25, 2017
Even as cyberattacks have evolved, phishing remains the number one threat delivery tactic. Why? Because it’s effective. That’s the bad news. The good news is, your organization can effectively defend against phishing attempts with the right program in place. You can stand in the way of the abuse of your most mission-critical communications app. There are six key areas to consider. Read this Gartner research note, Fighting Phishing: Optimize Your Defense, to advance your anti-phishing program.
Tags : anti-phishing, cyber security, secure email gateway, url filtering, mimecast
     Mimecast
By: Sophos     Published Date: Mar 30, 2017
With an estimated 500,000 'Internet of Things' devices using default security credentials it's little wonder that the recent Mirai botnet's DDoS attack was able to cause such widespread disruption. But it isn't just the average home-user that's at risk. Organizations like yours are being targeted with bespoke malware in order to compromise your network and add your servers and devices to malicious botnets. This paper explains why these attacks are so successful, how a typical infection takes place and what security systems your organization should have in place to defend against botnet proliferation.
Tags : web protection, email protection, web application firewall, intrusion protection, sandboxing, threat protection
     Sophos
By: Sophos     Published Date: Mar 30, 2017
Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for years—social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones. Such attacks are neither advanced nor particularly sophisticated when broken down into their individual components and often rely on the weakest link in any organization—the user. However, the way in which hackers use combinations of techniques and the persistent behavior of the attackers is something that does set APTs apart from other attempts to compromise security. This paper is designed to give you an overview of the common characteristics of APTs, how they typically work, and what kind of protection is available to help reduce the risk of an attack.
Tags : network security, firewall, data security, antivirus protection, email protection, virtual security, web protection, wireless protection, it security
     Sophos
By: Sophos     Published Date: Mar 30, 2017
Threats are becoming increasingly dynamic, forcing organizations to defend against both traditional malware and new advanced attacks. As a result, more and more organizations are making the switch to next-gen endpoint protection from Sophos to get the proven, innovative defense they need. Read this solution brief to learn how Sophos Next-Gen Endpoint Protection delivers the protection, usability and support required to stay ahead of the constantly evolving threat landscape.
Tags : cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
     Sophos
By: Sophos     Published Date: Mar 30, 2017
Ransomware threats like Cryptowall, TeslaCrypt, and Locky are on the rise, targeting organizations of all sizes. This paper explains how these attacks work, and why a large number of new infections continue to surface despite existing protective measures. It also provides practical short- and long-term steps that organizations should take to protect against them.
Tags : security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
     Sophos
By: McAfee     Published Date: Jun 03, 2014
Discover how Advanced Evasions will break the security protection model being used by most organisations and learn how to better protect your business against these attacks.
Tags : advanced evasion techniques, hacking methods, protection, firewalls, network security, anti spam, anti spyware, anti virus, hacker detection, high availability, internet security, network security appliance, security management
     McAfee
By: Arbor     Published Date: Feb 07, 2013
How the Arbor Security Engineering & Response Team (ASERT) Discovers, Analyzes and Mitigates DDoS Attacks
Tags : arbor, ddos attacks, botnet
     Arbor
By: Arbor     Published Date: Feb 07, 2013
In today’s environment, any enterprise operating online—which means just about any type and size of organization—can become a target because of who they are, what they sell, who they partner with or for any other real or perceived affiliations.
Tags : arbor, anti-ddos, ddos attacks, threat
     Arbor
By: Trend Micro     Published Date: Feb 01, 2013
This whitepaper will explore the anatomy of targeted attacks: the inner workings of the APT lifecycle. It will also provide an in-depth overview of Trend Micro Deep Discovery advanced threat protection solution, and how it enables enterprise IT to adopt a custom defense strategy that modernizes its risk management program to defend against targeted attacks. Deep Discovery is at the heart of the Trend Micro Custom Defense solution against targeted attacks.
Tags : advanced persistent, threat challenge, custom defense solution, trend micro, risk management
     Trend Micro
By: Trend Micro     Published Date: Feb 01, 2013
Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a point solution but rather a combination of technologies and core competencies. Detecting and responding to advanced threats should involve tight integration of multiple security technologies, network analysis and visibility (NAV) tools, the ability to automatically generate content such as security rules and signatures, context on attacker history, and overall customization and flexibility to ensure that the solution is fine-tuned for your specific IT environment.
Tags : security, advance threat detection, nav
     Trend Micro
By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, hacker detection, internet security, intrusion detection, intrusion prevention, security management, web service security, vulnerability management
     Symantec
By: Symantec     Published Date: Nov 24, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, email security, encryption, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, web service security, vulnerability management
     Symantec
By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, web service security
     Symantec
By: Symantec     Published Date: Nov 24, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security, encryption, firewalls, hacker detection, high availability, identity management, internet security, intrusion detection, intrusion prevention, web service security, vulnerability management
     Symantec
By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, email security, internet security, intrusion detection, intrusion prevention, web service security
     Symantec
By: Symantec     Published Date: Nov 24, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security, encryption, firewalls, hacker detection, high availability, identity management, internet security, intrusion detection, intrusion prevention, web service security, vulnerability management
     Symantec
By: F5 Networks Inc     Published Date: Mar 30, 2018
Until recently, security teams for organizations in many industries believed they didn’t need to worry about DDoS attacks, but the latest data from the Verizon 2017 Data Breach Investigations Report indicates that businesses of all sizes in nearly every industry run the risk of being attacked.¹ IoT devices are increasingly compromised, recruited into botnets, and offered up by their creators as for-hire DDoS services. Additionally, there are numerous DDoS tools and services that are easily accessible and easy to use, even for the untechnical novice.
Tags : protection, ddos, security, reporting, organization, device
     F5 Networks Inc
By: Centrify Corporation     Published Date: May 22, 2018
A significant paradigm shift occurred in the last few years. Much like other technological shifts of the last decade — when cloud computing changed the way we do business, agile changed the way we develop software and Amazon changed the way we shop — Zero Trust presents us with a new paradigm in how we secure our organizations, our data and our employees. While difficult to identify the precise tipping point, one thing is certain: what were once extraordinarily high-profile, damaging breaches are no longer extraordinary. In just the last 18 months, Yahoo, Accenture, HBO, Verizon, Uber, Equifax, Deloitte, the U.S. SEC, the RNC, the DNC, the OPM, HP, Oracle and a profusion of attacks aimed at the SMB market have all proven that every organization — public or private — is susceptible. The epiphany behind the paradigm shift is clear: Widely-accepted security approaches based on bolstering a trusted network do not work. And they never will. Especially when businesses are dealing with skill
Tags : 
     Centrify Corporation
By: EMC Corporation     Published Date: May 27, 2014
RSA Technical Brief: The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions. This technical brief discusses why combating advanced threats depends on organizations shifting more security resources from prevention to detection and remediation, and developing intelligence-driven security programs.
Tags : emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
     EMC Corporation
By: EMC Corporation     Published Date: Oct 01, 2014
RSA Security Analytics and RSA ECAT give security teams an edge in the hunt for cyber attacks.
Tags : cyber attacks, live, virtual, security, analytics, ecat
     EMC Corporation
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.