Hacker Detection

Hacker in a security context refers to a type of computer hacker who is involved in computer security/insecurity and is able to exploit systems or gain unauthorized access through skills, tactics and detailed knowledge.
Results 1 - 25 of 346Sort Results By: Published Date | Title | Company Name
By: Gigaom     Published Date: Oct 23, 2018
In this 1-hour GigaOm webinar, you will discover why Phishing Control is the most efficient method to protect systems and free up resources in your security programs arsenal.
Tags : area 1, cyber attacks, data protection, network protection, phishing, security, network security, hacker detection, intrusion prevention
     Gigaom
By: iboss     Published Date: Jan 22, 2018
Choosing the right cybersecurity solution has never been more important. Organizations need to understand why all security technologies are not alike.
Tags : iboss, cybersecurity, intrusion detection, security, cyberattack, network security, hacker detection, intrusion prevention, ssl, wireless security, data protection
     iboss
By: iboss     Published Date: Jan 22, 2018
On behalf of iboss, Researchscape conducted an online survey of 104 U.S. IT executives at large enterprises to better understand attitudes and initiatives for addressing cybersecurity.
Tags : iboss, remote access, byod, cybersecurity, mobile workforce, network security, vpn, access control, email security, hacker detection, mobile workers, smart phones, wireless security, data protection, desktop management, cloud computing
     iboss
By: RSA     Published Date: Sep 19, 2017
This paper sets out five basic steps organizations may want to consider to help set up a framework for managing GDPR risk.
Tags : rsa, rsa security, data breach, data protection, gdpr, network security, compliance, email security, hacker detection, intrusion prevention, web service security
     RSA
By: Thales     Published Date: Jul 13, 2017
Watch expert Nancy Spizzo for an informative recorded webinar, where she'll use real-world examples to highlight best practices and dispel myths about patient data protection. Spizzo will also discuss current trends in healthcare data security and HIPAA enforcement.
Tags : thales, data protection, health records, data security, hippa, hacker detection, intrusion prevention, best practices, records management
     Thales
By: GE Power     Published Date: Jan 27, 2017
Don’t wait to implement your cyber protection program. An excellent place to begin developing your approach is with the newly published The U.S. Homeland Security Strategies for Defending Industrial Control Systems. See the 7 recommended strategies and learn and how digital solutions can help fulfill steps toward a more secure operating environment.
Tags : cyber security, power plants, utilities, power producers, power plant, cyber attacks, power grids, power industry, power plant software, us homeland security, cyber security strategy, powerplant security, powerplants, cyber security assessment, network security, hacker detection, intrusion detection, intrusion prevention, security policies, data protection
     GE Power
By: Secureworks     Published Date: Nov 11, 2016
This paper takes an in-depth look at the true costs — both short and long term — of a data breach, and provides steps and tips that executive teams and security leaders can use to determine and reduce the true cost of a data breach.
Tags : managed security services, data breach, security, hackers, security, threat and vulnerability management, cost, hacker detection, vulnerability management
     Secureworks
By: Lenovo and Intel     Published Date: Oct 14, 2016
Get the details on the top threats to IT Security. This detailed (and entertaining) eBook provides you with the key stats you need to identify and stay ahead of the top six threats to IT security today—from ransomware to phishing and spyware to DDoS attacks. Download the eBook to get all the details!
Tags : security, ransomware, spyware, malware, theft, it threat, anti spyware, ddos, hacker detection, internet security, security management
     Lenovo and Intel
By: Cisco     Published Date: Oct 11, 2016
The Cisco® 2016 Midyear Cybersecurity Report—which presents research, insights, and perspectives from Cisco Security Research—updates security professionals on the trends covered in our previous security report while also examining developments that may affect the security landscape later this year.
Tags : cybersecurity, attackers, http, ransomeware, malware, hacker detection, internet security, network security appliance
     Cisco
By: IBM     Published Date: Oct 06, 2016
Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months and can cost an organization an average of 11 million USD.
Tags : cyber security, security analysis, integrated data systems, cyber intelligence, malware investigation, hacker detection, internet security, web service security
     IBM
By: IBM     Published Date: Oct 06, 2016
Defensive weak spots are just waiting to be found and exploited by persistent cyber attackers. But with cyber threat analysis, you quickly identify, disrupt and mitigate breaches by uncovering critical insights unseen by traditional defenses.
Tags : cyber security, threats, enterprise insight analysis, data computation, intelligence, hacker detection, internet security, intrusion detection, security management
     IBM
By: IBM     Published Date: Oct 06, 2016
IBM® i2® Analyst’s Notebook® provides rich visual analysis capabilities that help to quickly turn complex sets of disparate information into high-quality, actionable intelligence. It is designed to help analysts, and others involved in intelligence analysis, identify, predict, and prevent criminal, terrorist and fraudulent activities.
Tags : cyber security, intelligence, prevention, ibm, data protection, network management, hacker detection, internet security, network security appliance
     IBM
By: NAVEX Global     Published Date: Aug 18, 2016
This Cyber Security Awareness Kit illustrates how to make your organisation more secure by neutralizing the leading cause of cyber security risk: your employees.
Tags : cyber attack, risk, cyber security, cyber criminals, cyber risks, security, security application, cyber security awareness kit, anti spyware, application security, disaster recovery, hacker detection, internet security, security management, security policies
     NAVEX Global
By: Centrify     Published Date: May 26, 2016
Many organizations are turning to multi-factor authentication (MFA) or two-factor authentication (2FA) to reduce the risk of stolen passwords. This paper examines best practices for deploying MFA
Tags : authentication, multi-factor authentication, threat protection, cyber attacks, hacker detection, identity management, security management
     Centrify
By: Centrify     Published Date: May 26, 2016
This paper examines how securing identity is at the center of protecting your users, systems and data. In fact, today’s threats require a next-generation identity platform. And how Centrify secures enterprise identities through the Centrify Identity Platform.
Tags : data security, security, cyber attacks, threat and vulnerability management, access control, application security, hacker detection, security management
     Centrify
By: Code42     Published Date: Apr 22, 2016
The study’s findings highlight discrepancies—between IT departments and end users—in the approach and attitudes toward data protection. The results provide compelling evidence that there is vast room for improvement in securing critical data flowing between the corporate enterprise and endpoint devices. Read this paper to find how to protect your data today.
Tags : datastrophe study, code 42, data protection, data backups, anti spyware, anti virus, application security, authentication, email security, encryption, firewalls, hacker detection, internet security, intrusion detection, security management
     Code42
By: Code42     Published Date: Apr 22, 2016
Read this whitepaper to find out strategic solutions to your data protection issues.
Tags : data protection, data control, code 42, data visibility, encryption, hacker detection, network security appliance, security management
     Code42
By: Akamai Technologies     Published Date: Mar 10, 2016
When your Internet-facing network comes under DDoS attack, does your entire organization panic – or does everyone know exactly what to do? Read this whitepaper to learn how to protect network assets, websites, and web applications against DDoS attacks and best practices for adding DDoS mitigation to a corporate incident response plan.
Tags : ddos mitigation, best practices, akamai technology, cyberdefense, cyber security, anti spam, anti virus, ddos, hacker detection, internet security, intrusion detection, intrusion prevention
     Akamai Technologies
By: Logrhythm     Published Date: Feb 24, 2016
In this webinar, learn how LogRhythm reduces mean time to detect (MTTD) and mean time to respond (MTTR) through machine-driven, real-time behavioral analytics, rapid forensic search and automated response.
Tags : logrhythm, cyber attacks, cyber threat, security, security application, application security, compliance, hacker detection, intrusion detection, intrusion prevention, security management, security policies
     Logrhythm
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Learn how XenMobile uses EMM to enable BYOD and CYOD/COPE mobility programs without impacting user experience, and without inflating costs or introducing security risks.
Tags : citrix, byod, strategy, mobile, mdm, mobile app management, emm, mobility, infrastructure, ip networks, ip telephony, hacker detection, internet security, security management, security policies, risk management, data protection, collaboration, messaging
     Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
The enterprise mobility landscape is changing and you need a solution that has you covered no matter what the future brings. Read the report to find out why Citrix has been named a leader.
Tags : citrix, gartner, magic quadrant, enterprise, mobility, hacker detection, intrusion prevention, business management
     Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Gartner evaluates nine vendors’ enterprise mobility management (EMM) solutions against 11 critical capabilities in the 2015 Critical Capabilities for Enterprise Mobility Management Suites report.
Tags : citrix, gartner, enterprise, mobility, management, mobility, ip telephony, network security, email security, hacker detection, mobile computing, smart phones, wifi, wireless phones, wireless security, data protection, collaboration, secure content management
     Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn what traditional network security solutions can’t do and why your organization needs a web application firewall as a cornerstone of its IT security strategy
Tags : citrix, web application, firewall, security, network security, remote access, firewalls, hacker detection, internet security, intrusion prevention
     Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Get an overview of the cyberthreat landscape and see key findings from the “2015 Cyberthreat Defense Report.”
Tags : citrix, cyberthreat, infographic, 2015 report, application security, firewalls, hacker detection, intrusion prevention, data protection, secure content management
     Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Customers, employees and partners are more frequently accessing web-delivered services from their mobile devices. At the same time, attackers are constantly discovering new ways to compromise security, including advanced malware and application layer attacks. Without the right tools, you are vulnerable. NetScaler gives you the visibility and control to manage, accelerate, and secure all your web properties, so you can deliver both the service and security your users demand. To learn more about web security and NetScaler, read the full report: Defend Web Properties from Modern Threats with Citrix NetScaler
Tags : citrix, security, netscaler, web, hacker detection, web service security, web services, data protection, secure content management
     Citrix Systems, Inc.
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search White Papers