hacker

Results 126 - 150 of 214Sort Results By: Published Date | Title | Company Name
Published By: Revel Systems     Published Date: Jul 22, 2015
Hacking is a fact for life. Some hack for fame, some for sport, others for profit. In 2013 a group of hackers created and sold tens of thousands of dollars in gift cards after hacking Subway's point of sale. The 2013 "Holiday Hackers" have stolen data from 110 million innocent consumers and counting, damaging the reputation and bottom line of major retailers such as Target and Neiman Marcus, as well as credit card providers like JPMorgan.
Tags : 
point of sale, security for your retail shop, ipad pos, pos security
    
Revel Systems
Published By: LookingGlass Cyber Solutions     Published Date: Apr 26, 2016
The Internet of Things (IoT) is expanding in a dramatic way, bringing to question the issue of availability versus security, as security measures are having a difficult time keeping pace with the development of IoT devices. The introduction of more efficient semiconductors, coupled with revolutionary technology that allows semiconductors to store as well as process complex instructions, means that the IoT may be a more attractive target for hackers. IoT devices from healthcare and industrial systems (i.e., SCADA) could be the most at risk for significant service interruptions and may have secondary and/or tertiary effects on other industries.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
LookingGlass Cyber Solutions
Published By: Symantec     Published Date: Jul 11, 2017
CloudSOC can help you more easily determine which apps should be blocked and which should be allowed within your organization by assisting in identifying unsanctioned Shadow IT, providing customized Business Readiness Ratings for each cloud app tailored to your organizations risk profile, and applying User Behavior Analytics (UBA) to identify hackers and malicious usage. Here youll learn how to guide your organization through the process of safely adopting cloud apps and services using Symantec CloudSOC.
Tags : 
cloud application, cloud app adoption, cloud security, cloud protection, shadow it
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
In the fast moving web environment, where hackers frequently change their tactics, a defense-in-depth strategy of deploying the ProxySG in conjunction with an NGFW is essential for providing optimal protection. The ProxySG is engineered to withstand evasion techniques, making it a perfect complement to your NGFW. Its leading web-proxy technology identifies and blocks malicious web content, and its open architecture allows integration with best-of-breed products for an enhanced security posture. These top 10 advantages represent just a few of the reasons why SWG and NGFW technologies are complementary in nature and why enterprises should implement them together for a layered defense against advanced attacks and targeted threats.
Tags : 
proxy deployment, firewall, threat detection, threat protection
    
Symantec
Published By: IBM MaaS360     Published Date: Apr 16, 2015
Android: With each new confectionary code name, Googles mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : 
fiberlink, android, mobile users, strategy, app enabled, scalability, security, device management
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Android: With each new confectionary code name, Googles mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : 
google, google mobile os, android, hackers, security, emm, enterprise mobility management, networking
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
Hacktavists have made the move to mobile. Malware, phishing and network attacks are now as likely to strike smartphones and tablets like any other system. Mobile Threat Management is now needed to stay ahead of new vectors of vicious intent.
Tags : 
ibm, fiberlink, maas360, mobile, malware, hackers, phishing, threat management
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
With each new confectionary code name, Googles mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : 
ibm, fiberlink, maas360, android, google, enterprise, data, security
    
IBM MaaS360
Published By: Cisco     Published Date: Jul 11, 2016
Todays corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security.
Tags : 
    
Cisco
Published By: Lancope     Published Date: Jun 21, 2014
Join us on June 25th at 2PM BST to find out how to detect sophisticated cyber attacks using network logging technologies and learn how you can use these technologies to create an audit trail of network activity.
Tags : 
lancope, cyberattack, cyber criminals, network security, hackers, audit trail, cyber audit, network intelligence
    
Lancope
Published By: IBM     Published Date: May 01, 2017
Endpoints continue to advance Employees come and go... And the security landscape is in constant flux. IT leadership must rise to the challenge of managing a disparate and growing number of endpoints, operating systems, and platforms. The only efficient method of managing and securing all endpoints, their users, apps, content, and data is to implement and deploy a unified endpoint management (UEM) solution that changes and adapts with new technology, more skilled users, and increasingly sophisticated attacks by hackers. Read onward to learn why UEM is necessary, how it addresses complex problems encountered in the modern enterprise, and best practices for a successful deployment.
Tags : 
endpoints, employees, security landscape, security leaders, it security, unified endpoint management
    
IBM
Published By: Arbor Networks     Published Date: Mar 13, 2015
As the world becomes more connected, it is no longer enough for enterprises to react once an alert indicates an attacker is inside the network. Instead, with continuous packet capture and threat feeds followed by analysis, it is now possible to hunt the attackers and locate them versus waiting for an alert.
Tags : 
arbor, arbor networks, hackers, cyberattacks, internet security, intrusion prevention, network security, anti virus
    
Arbor Networks
Published By: Cisco     Published Date: Dec 21, 2016
Todays corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security.
Tags : 
    
Cisco
Published By: Kaspersky     Published Date: May 20, 2014
Virtualization promises to boost efficiency and cut costs. Whether youre running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.
Tags : 
virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention
    
Kaspersky
Published By: Kaspersky     Published Date: Jan 07, 2015
Do you know the most common risk factor for corporate cybercrime? Employees. Download Kaspersky Labs Top 10 Tips for Educating Employees about Cybersecurity.
Tags : 
kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
Kaspersky
Published By: Kaspersky     Published Date: Nov 12, 2014
Download Kaspersky Labs latest eBook, Rethinking Security: Fighting Known, Unknown, and Advanced Threats, to learn more about the evolution of cyberthreats that put your business at risk.
Tags : 
kaspersky, cybersecurity, cyberattack, hackers, it security, data protection, network security, anti virus
    
Kaspersky
Published By: Kaspersky     Published Date: Jun 15, 2015
Download Kaspersky Labs Unlock the Key to Repel Ransomware to learn common ransomware scenarios and delivery mechanisms.
Tags : 
kaspersky, ransomware, cybercrime, cyberattack, hackers, data leakage, spam, malware
    
Kaspersky
Published By: bitglass     Published Date: Aug 19, 2014
In this Gigaom Research Webinar, we will separate the real threats from the hype, identify the most common forms of security breaches, and discuss the tools and processes businesses can put in place to minimize exposure and damage.
Tags : 
bitglass, saas, saas security, crm, microsoft, salesforce, identity theft, security breach
    
bitglass
Published By: Symantec     Published Date: Apr 09, 2012
Download this white paper, to learn how you can reduce the risk of hackers finding your site and attacking it by using automated vulnerability assessments to identify exploitable weaknesses and take corrective action.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec
Published By: Rapid7     Published Date: Mar 19, 2014
In this guide, penetration testers will learn how to evade anti-virus detection on target machines for your Metasploit pen tests. This guide will be most useful to readers who already have some penetration testing experience and are familiar with Metasploit Pro.
Tags : 
rapid7, security, anti virus, virus protection, antivirus, spam, hackers, internet security
    
Rapid7
Published By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : 
mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments
    
McAfee
Published By: Astaro     Published Date: Aug 10, 2009
Hannoush Jewelers Inc., a jewelry manufacturer and retailer, was using frame relay, a private network, but decided to cut costs by moving to VPN tunnels to connect their many stores and offices.
Tags : 
hannoush, jewelery, private network, frame relay, vpn, tunnels, hackers viruses, spam
    
Astaro
Published By: Asure Software     Published Date: Nov 06, 2013
The white paper will discuss in greater detail what the cost associated with audits, corporate hackers, tax issues, payroll disputes, and employee lawsuits can be. We will then explore how time management software can resolve the problem, and what the next steps to implementing this technology are.
Tags : 
data security, data storage, payroll security, payroll data, workforce management solutions, workforce management software, time and labor management
    
Asure Software
Published By: Viavi Solutions     Published Date: Jun 30, 2014
News of recent credit card hacks has rocked consumer confidence. Even talk of a security breach can bring on a PR firestorm. What can you do to make sure your customers and clients are protected? The 12 Payment Card Industry (PCI) Data Security Standard (DSS) requirements along with the right Application Performance Monitoring (APM) solution can help keep you one step ahead of the hackers.
Tags : 
network instruments, hacks, apm, security, pci, dss, hackers, database security
    
Viavi Solutions
Published By: Kaspersky     Published Date: Jan 22, 2016
Hardly a day goes by without the discovery of a new cyber threat somewhere in the world! But how do you keep up with new malware and evolving cybercriminal tricks?
Tags : 
kaspersky, cybercrime, hackers, malware, threat protection, network security, firewalls, hacker detection
    
Kaspersky
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.