Compliance Week
 

cybersecurity

Results 1 - 25 of 199Sort Results By: Published Date | Title | Company Name
Published By: Limelight     Published Date: Feb 16, 2018
Websites are indispensable for many companies to build their profits, but as the threat of cyber attacks increases, websites can also be a serious risk factor. Therefore companies need to simultaneously develop both the convenience and security of websites. This whitepaper outlines the optimal solution for smartly achieving these two aims at the same time.
Tags : 
content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security, ddos attack, digital rights management, drm
    
Limelight
Published By: Limelight     Published Date: Feb 16, 2018
DDoS attacks have long been known as the main form of cyber attack risk. “The Financial Inspection Manual” revised by the Japanese government’s Financial Services Agency in April 2015, identifies the risk of "DDoS attacks", and the need to take countermeasures is strongly emphasized. Other government agencies also acknowledge the frequency and severity of DDoS attacks. However, a clear method to completely prevent DDoS attacks has not been established yet. Why is that? What are the best measures that companies can take at the present time?
Tags : 
content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security, ddos attack, digital rights management, drm
    
Limelight
Published By: Carbon Black     Published Date: Apr 10, 2018
For decades, the financial services industry has endured constant change and uncertainty, from the depths of a financial crisis to widespread regulation overhauls. With the advent of more advanced cybersecurity threats, the industry has responded with rapid digital transformation to remain competitive while also pushing the envelope. Today, managing and mitigating cyber-related risks not only draws government scrutiny, but increased consumer scrutiny as well, with longstanding brand reputations anchored to institutions’ ability to protect its most sensitive data. In a recent survey of Americans, financial information was considered by consumers to be their most valuable personal information, worth even more than personal or family photos and videos. For consumers, failing to protect their data is a grave violation of trust, to the point where 72% would consider leaving their current financial institution if their sensitive information was taken hostage by ransomware.1 Not only does the
Tags : 
    
Carbon Black
Published By: CrowdStrike     Published Date: Feb 05, 2018
Learn how cyber threat intelligence (CTI) helps you bolster defenses, hunt down adversaries,investigate incidents and make better security decisions. While once considered a “nice to have”, Cyber Threat Intelligence (CTI) is now widely considered an essential weapon against breaches. A recent study by Enterprise Strategy Group (ESG) found that 72 percent of organizations plan to increase CTI spending — further validation of its important role in your security strategy. Yet, because threat intelligence comes in many shapes and forms, it is often misunderstood. This white paper, “Threat Intelligence, Cybersecurity’s Best Kept Secret,” offers in-depth coverage of CTI, including the different categories of threat intelligence and use cases that demonstrate CTI’s effectiveness in thwarting today’s most dangerous and sophisticated attackers. You’ll also learn how the right CTI can empower better security and executive decisions, while dramatically improving your organization's security pos
Tags : 
    
CrowdStrike
Published By: Code42     Published Date: Feb 28, 2018
Disaster Recovery Plan Roadmap Learn how automatic backup delivers guaranteed business data protection and recovery—no matter the threat. When ransomware hits, the average small business experiences two full days of downtime. One-third of businesses lose revenue and all experience brand and loyalty damage that’s harder to quantify. To stop the bleeding, most small businesses end up paying at least $2,500 to get their data back. But paying the ransom doesn’t guarantee anything. Plenty of businesses have fully complied with the ransom demands, only to have the ransomer increase the ransom request—or simply take off with the ransom and the data.
Tags : 
    
Code42
Published By: QTS     Published Date: Nov 04, 2016
Healthcare accounts for 21% of all cybersecurity breaches, making it the most affected business sector in the U.S. economy. Ongoing attacks are predicted to cost providers $305 billion in lifetime revenue over the next few years. Download this white paper to learn how to make healthcare cybersecurity stronger.
Tags : 
healthcare, cyber security, data security, security
    
QTS
Published By: Akamai Technologies     Published Date: May 05, 2017
To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing website infrastructure or within a data center with security measures in the cloud for a more robust security posture. We share Akamai’s approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics — so you can make more educated decisions about the best solutions for your needs.
Tags : 
cloud security, data, akamai
    
Akamai Technologies
Published By: Cisco     Published Date: Jul 08, 2016
Disruptors now harness the power of digital to create new sources of value that reduce costs, improve the customer experience, and scale their offerings. Digital disruptors also enjoy a decided innovation advantage over established companies: they are better able to identify new opportunities, and move faster to take advantage of them. In this intensely competitive environment, startups and agile firms are overturning incumbents with digital business models, products, and services.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Oct 11, 2016
The Cisco® 2016 Midyear Cybersecurity Report—which presents research, insights, and perspectives from Cisco Security Research—updates security professionals on the trends covered in our previous security report while also examining developments that may affect the security landscape later this year.
Tags : 
cybersecurity, attackers, http, ransomeware, malware
    
Cisco
Published By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
MIT Technology Review Survey: Executive Summary Are you prepared for the next breach? Only 6% of leaders say yes. Information security—or, the lack of it—is firmly on the radar for business and IT leaders in organizations of all sizes and in every sector. Many fear that their companies are ill-prepared to prevent, detect, and effectively respond to various types of cyberattacks, and a shortage of in-house security expertise remains of widespread concern. Those are among the initial findings of the Cybersecurity Challenges, Risks, Trends, and Impacts Survey, conducted by MIT Technology Review of approx. 225 business and IT executives, in partnership with Hewlett Packard Enterprise Security Services and FireEye Inc.
Tags : 
    
Hewlett Packard  Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
Is your organization prepared for a cyberattack? Most aren’t. 86% of organizations surveyed lack adequate cybersecurity capabilities. Read MIT Technology Review’s latest infographic, based on their survey of 225 business and IT leaders, and learn if you have cybersecurity holes and how to patch them.
Tags : 
    
Hewlett Packard  Enterprise
Published By: CrowdStrike     Published Date: Aug 01, 2017
While many organizations are guarding the front door with yesterday’s signature-based antivirus (AV) solutions, today’s unknown malware walks out the back door with all their data. What’s the answer? A new white paper, “The Rise of Machine Learning in Cybersecurity,” explains machine learning (ML) technology —what it is, how it works and why it offers better protection against the sophisticated attacks that bypass standard security measures. You’ll also learn about CrowdStrike’s exclusive ML technology and how, as part of the Falcon platform’s next-gen AV solution,it dramatically increases your ability to detect attacks that use unknown malware. Download this white paper to learn:?How different types of ML are applied in various industries and why it’s such an effective tool against unknown malware?Why ML technologies differ and what factors can increase the accuracy and effectiveness of ML ?How CrowdStrike’s ML-based technology works as part of the Falcon platform’s next-generation AV
Tags : 
    
CrowdStrike
Published By: Gigamon     Published Date: Oct 19, 2017
Read the IDG Tech Dossier, A Security Delivery Platform Benefits the Entire Organization to learn how a comprehensive, well-integrated security platform provides the foundation for the next generation of cybersecurity. By uniting a variety of security solutions and appliances for efficient operation through network visibility and security workflow orchestration, organizations benefit from continuous and pervasive network visibility, fault tolerance and scaling and optimal CPU utilization – thereby improving security and reducing cost. Download now!
Tags : 
    
Gigamon
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security, digital rights management
    
Limelight Networks
Published By: Akamai Technologies     Published Date: Aug 17, 2017
The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Businesses are increasingly relying on the cloud for cybersecurity for two key reasons: 1. Due to a changing threat landscape, there’s a need for more scale, accuracy, experience, and collective intelligence. These resources are out of reach internally for most organizations. 2. There are fundamental limits with on-premises hardware mitigation appliances and enterprise data centers for Distributed Denial of Service (DDoS) and web attack protection.
Tags : 
cloud security, scale, data center, ddos
    
Akamai Technologies
Published By: KeyBank Commercial Banking     Published Date: May 10, 2017
When it comes to the middle market, Key has a dedication like no other bank. Our commitment and focus allow us to deliver relevant, actionable, and tailored solutions for middle market companies. As part of this commitment, KeyBank conducts quarterly surveys with middle market executives. We believe that the more we know, the better we can serve you. Check out what leaders are saying about the economy, future growth and cybersecurity when you download our latest quarterly report. Member FDIC. © 2017, KeyCorp. CFMA 20170424- 224928
Tags : 
middle market, us economy, economic outlook, customized solutions, cybersecurity, business success, business goals, business expansion, financial outlook, fraud, business growth, m&a
    
KeyBank Commercial Banking
Published By: Dell EMC     Published Date: Feb 23, 2017
Desktop and application virtualization have steadily gained ground to address a broad range of use cases across organizations of all sizes. According to ESG research, over the past few years, desktop virtualization has consistently risen to be included among the five most commonly-identified IT priorities, alongside such perennial corporate objectives as fortifying cybersecurity and managing data growth.
Tags : 
    
Dell EMC
Published By: Akamai Technologies     Published Date: Aug 17, 2017
To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing infrastructure within the data center with security measures in the cloud for a more robust web security posture. We also share Akamai’s approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics — so you can make more educated decisions about the best solutions for your needs.
Tags : 
cloud security, buyer's guide, data safety, cybersecurity
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Venafi     Published Date: Aug 10, 2015
This whitepaper reveals how Security Operations teams can eliminate these outages.
Tags : 
security, security operations, outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks, data protection, ssl, tls
    
Venafi
Published By: VMware     Published Date: Oct 05, 2015
Security breaches targeting government and military data centers are increasing. Attackers have learned to defeat current means of physical network security, which emphasize perimeter defense. Today, organizations must protect the workloads inside the data center, utilizing a concept called micro-segmentation to build a “Zero Trust” network. But that has been unrealistic, requiring too great an investment in hardware, time, and manpower — until now, that is. Download this use case from VMware and Carahsoft® now to learn why.
Tags : 
vmware, cybersecurity, vmware nsx, security breach solutions, microsegmentation, zero trust, zero trust network, carahsoft, security
    
VMware
Published By: Cisco     Published Date: Mar 17, 2017
The Cisco 2017 Annual Cybersecurity Report presents research, insights, and perspectives from Cisco Security Research. This research can help your organisation respond effectively to today’s rapidly evolving and sophisticated threats.
Tags : 
cyber security, threat and vulnerability management, security, attacks, threat detection
    
Cisco
Published By: Cisco     Published Date: Sep 14, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency
Tags : 
    
Cisco
Published By: Cisco     Published Date: Sep 21, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency. In these reports, we strive to alert defenders to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information, and create disruption. Download this whitepaper to find out more.
Tags : 
cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
Cisco
Published By: Panasonic     Published Date: Aug 04, 2016
Cybersecurity is top of mind for companies with workers using mobile computing devices. Report identifies top field service security risks, why security policies are critical, and includes a security checklist.
Tags : 
cyber risk, security, mobile security, best practices
    
Panasonic
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.