threat

Results 1 - 25 of 1814Sort Results By: Published Date | Title | Company Name
By: MessageLabs Australia     Published Date: Aug 04, 2008
The rise of online social networking poses new risks for businesses and new challenges for IT Management. As sites such as Facebook, Myspace and Bebo become evermore popular with end-users, businesses must consider risks such as employee cyber-slacking, reputation damage, broken privacy, identity theft and the threat of virus and spyware infections. This guide will help you reduce the risks of uncontrolled social networking use within the workplace and prescribes seven simple steps for both you and your end-users.
Tags : web security, internet security, social networking, facebook, myspace, my space, social, messagelabs, employee, it management, anti spyware, anti virus, employee performance, productivity
     MessageLabs Australia
By: MessageLabs Australia     Published Date: Aug 04, 2008
At MessageLabs, we understand that deploying best practices in security means working with the people around you - and we'd like to help! Download this free pack of resources to help educate your employees about the latest threats and best practices around email and web security.
Tags : threats, threat, email security, web security, internet security, messagelabs, security, best practices
     MessageLabs Australia
By: Atlantic Broadband     Published Date: Apr 30, 2018
In order to maintain their commitment to customer service, Girard Toyota looked to upgrade their outdated phone system. The antiquated system they were using was not only costly to maintain, but also inhibited their efficiency inbound calls were not answered in a timely fashion, and when they were, the hold times were much too long. Calls were not being transferred to the correct representatives, causing frustration for both new and existing customers. The entire customer experience was negatively impacted, threatening to cost the company revenue and its prized reputation for superior customer service.
Tags : girard, toyota, atlantic, broadband, business, solutions
     Atlantic Broadband
By: Google     Published Date: Apr 26, 2018
No one in todays highly connected world is exempt from security threats like phishing, ransomware, or denial-of-service (DoS) attacks. Certainly not Google. Google operates seven services with more than one billion active users each (including Google Search, YouTube, Maps, and Gmail). We see every type of attack, bad software, and bad actorsmultiple times a dayand were proud of what our people, processes, and technology do to stop them. Google has published more than 160 academic research papers on computer security, privacy, and abuse prevention and has privately warned other software companies of weaknesses discovered in their systems. Within Google, we enforce a zero-trust security model, which monitors every device on the internal network.
Tags : 
     Google
By: Schneider Electric     Published Date: Jun 05, 2018
Power industries - including Nuclear, Fossil, Hydro, Wind and Geothermal - are susceptible to a variety of cyber threats which can wreak havoc on control systems. Management, engineering and IT must commit to a comprehensive approach that encompasses threat prevention, detection and elimination.
Tags : smart control, power generation, power industry, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation
     Schneider Electric
By: Schneider Electric     Published Date: Jun 05, 2018
Cybersecurity threats are an unfortunate reality for industry everywhere. How do you protect your business while still embracing new technologies that enable you to grow and deliver the best possible results? Robust cybersecurity protection is a must, as well as rigorous mindset, policies, and methodologies. Download the whitepaper to learn more.
Tags : cybersecurity, smart control, empowered operators, optimized assets, future of automation, reliability, safety, operational profitability, ecostruxure plant, process automation
     Schneider Electric
By: Lookout     Published Date: Mar 28, 2018
Lookout has developed the Mobile Risk Matrix to help organizations understand the components and vectors that make up the spectrum of mobile risk and to provide data that will help enterprises gain a deeper understanding of the prevalence and impact of mobile threats and vulnerabilities.
Tags : 
     Lookout
By: Lookout     Published Date: Apr 18, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
     Lookout
By: Lookout     Published Date: Apr 18, 2018
Mobile security is making the role of todays CISO more complicated than ever. Watch the webinar for a discussion of current threats, a review of mobile security solutions, and best practices for adoption and implementation.
Tags : 
     Lookout
By: MobileIron     Published Date: Feb 26, 2018
During the third quarter of 2017, July 1 - September 30, several types of mobile risks and threats were detected around the world. The risks and threats are categorized as follows (and often referred to as mobile threat DNA
Tags : 
     MobileIron
By: MobileIron     Published Date: May 07, 2018
MobileIron knows that cybercriminals are continuously generating more advanced ways to steal your data by any means necessary. Thats why we are committed to continually innovating and delivering new solutions that help our customers win the race against time to get ahead of the latest mobile security threats. As part of that commitment, MobileIron Threat Defense supports the five critical steps to deploying advanced, on-device mobile security. Our solution provides a single, integrated app that delivers several key advantages.
Tags : mobile, threat, defense, security, mobileiron, cyber, criminal
     MobileIron
By: MobileIron     Published Date: May 07, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the lone wolf hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : mobile, threat, detection, machine, ransomware, confidential, networks
     MobileIron
By: MobileIron     Published Date: May 07, 2018
Enterprises and users continue to be concerned about mobile apps and mobile malware because they have been trained by legacy antivirus software packages. Look for a known malware file and remove it. The issue with this logic on mobile devices is the mobile operating systems evolve and add features very rapidly. The mobile operating systems add millions of lines of code in a year and therefore introduce unintended consequences, bugs and vulnerabilities. In 2017, there were more CVEs registered for Android and iOS than all of 2016 and 2015 combined. In 2017 there were 1229 CVEs awarded. Over half of these CVEs that received scores of 7 or greater indicated that the vulnerabilities are severe and exploitable. This trend is expected to continue as the mobile operating systems mature and more features are added.
Tags : global, threat, report, mobile, malware, software, antivirus
     MobileIron
By: Mimecast     Published Date: May 31, 2018
Not all email security systems perform the same. Lots of false negatives get through. Thats what Mimecast found in its new email security risk assessment (ESRA), an inspection of email security systems to uncover the number, type and severity of threats getting into organizations. - TOTAL CAUGHT SPAM: 14,277,163 - TOTAL CAUGHT DANGEROUS FILE TYPES: 9,992 - TOTAL CAUGHT MALWARE ATTACHMENTS: 12,502 Download our report of ESRA tests to see the threats that Mimecast catches and other email security systems miss.
Tags : 
     Mimecast
By: IBM     Published Date: May 09, 2018
Does the future of digital trust lie in artificial intelligence (AI)? Join the conversation between Valerie Bradford, product marketing manager at IBM Security, and Andras Cser, vice president and principal analyst serving security and risk professionals at Forrester, to discover how AI is changing the landscape of digital identity. Key takeaways: Understand how AI is helping organizations respond to current changes in the threat landscape. Examine how companies are using AI to establish trust in digital identities. Hear how AI is changing the end-to-end customer journey by improving the digital experience.
Tags : digital trust, security, digital identity
     IBM
By: IBM     Published Date: May 30, 2018
This book is designed to help you get the upper hand on managing your enterprise security through an integrated threat management strategy.
Tags : 
     IBM
By: IBM     Published Date: May 30, 2018
If you are relying on a basic log manager or spreadsheets to manage security alerts, you may be missing critical threats in your network. You could boost your team's productivity with a modern SIEM platform. In this E-Book, you will learn the five most critical questions that you need to ask in order to determine the best security analytics solution for your organization.
Tags : 
     IBM
By: Epicor     Published Date: Jun 11, 2018
Growth is definitely on the agenda for manufacturers, along with avoiding the pitfalls of rapid growth. This was clear in a global survey recently undertaken on behalf of Epicor Software Corporation (Epicor) by MORAR Consulting. Our research identified key factors that growing manufacturers cited as essential to their success, along with risks that manufacturers believe could threaten growth for unprepared businesses. The Epicor Profitable Growth in Action eBook features seven manufacturers and the factors they consider critical to their success. Get the eBook to learn how you can help boost your companys potential for profitable growth.
Tags : erp software, enterprise resource planning software, manufacturing, manufacturing technology, manufacturing software
     Epicor
By: Great Bay Software     Published Date: Apr 12, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of medical device hijacking. Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
     Great Bay Software
By: Workday UK     Published Date: Mar 08, 2018
The world is quickly changing, but a number of forces the evolving nature of work, the threat of disruptive innovation from competitors that dont exist yet, and the need to fundamentally rethink the structure and makeup of organisations are putting the CHRO in a unique position to support the CEO growth objective. Weve thoroughly reviewed the available research, and have picked out the findings that best answer these pressing questions for CHROs: How can you support your companys growth initiatives and develop an agile talent strategy that ensures you have the right people in place at the right time? How do you develop a culture that attracts, engages, and retains the best workforce? How can you tackle sticky issues like diversity and get your CEO and board on board?
Tags : 
     Workday UK
By: CA Technologies EMEA     Published Date: May 23, 2018
Todays most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
     CA Technologies EMEA
By: Trend Micro     Published Date: May 03, 2018
Skills and resources these are the two elements that make up an attackers arsenal. An attacker, however, cannot set out to break security or even perform sophisticated attacks without finding weak points in a system first. Massive malware attacks, email-borne heists, hacked devices, and disrupted services all of these require a vulnerability in the network, whether in the form of technology or people, in order to be pulled off. Trend Micro has looked into the current and emerging threats, as well as the security approaches tailored for the landscape. Read on to find out how to make informed decisions with regard to the security focus areas that will figure prominently in 2018.
Tags : 
     Trend Micro
By: Trend Micro     Published Date: May 03, 2018
Hybrid cloud security is a hot topic, especially with the massive growth of public cloud providers like Amazon Web Services (AWS), Microsoft Azure and Google Cloud. With the emergence of the hybrid cloud, where workloads are deployed across physical, virtual, and cloud, security professionals are constantly being challenged to evolve their security practices to adapt to this new architecture. Trend Micro Hybrid Cloud Security, powered by XGen, takes a blended approach. It combines multiple cross-generational threat defense techniques for protecting hybrid environments. When one technique isnt effective against a given threat, another will step in to eliminate the threat.
Tags : 
     Trend Micro
By: Trend Micro     Published Date: May 03, 2018
Since the early days of the Gartner Magic Quadrant for this category, there have been successive waves of innovation. Back in 2002, integrated firewalls captured the markets (and Gartners) attention. Over the years, weve seen technologies, such as full disk encryption, data loss prevention (DLP), behavioral detection, application control, and more recently, machine learning, as effective new ways to protect endpoints, detect threats and give security teams peace of mind. Trend Micro has consistently been part of these innovation waves. Its clear that the market is excited about Endpoint Detection & Response (EDR). There are two drivers for this, and we are committed to delivering effective solutions in both areas.
Tags : 
     Trend Micro
By: Trend Micro     Published Date: May 03, 2018
The evolution of cyber threats ad the cybercriminal community has evolved from the days of pranksters launching annoying viruses and spam that would be considered primitive today. While enterprises make concentrated efforts to protect their critical data, the lack of correlated and contextual network visibility can leave IT security organizations unable to prioritze the threats that matter the most.
Tags : 
     Trend Micro
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.