hacker

Results 51 - 75 of 217Sort Results By: Published Date | Title | Company Name
Published By: Cox Business     Published Date: Dec 19, 2016
Solutions that make it easy to keep track of security and software updates will give you an edge like no other. In many cases, hackers target specific holes in outdated software. Rather than dealing with the headache of continually updating each computer in your network, use tools that track and perform system updates automatically. Youll always be ahead of the curve.
Tags : 
    
Cox Business
Published By: Cox Business     Published Date: Dec 19, 2016
As we continue to move forward into an age of big data, optimization, and shared information through the capabilities of better networking technologies, opportunities have never been greater for using technology to improve the way the government interacts with constituents. However, increasing dependence on web and network services also makes government a tempting target for hackers. Distributed Denial of Service attacks, data breaches, leaks, the risks can be enormous. Recent events have shown us that now more than ever, government servers are getting victimized by well-funded teams of foreign hackers, possibly funded by their government.
Tags : 
    
Cox Business
Published By: Secureworks     Published Date: Nov 11, 2016
This paper takes an in-depth look at the true costs both short and long term of a data breach, and provides steps and tips that executive teams and security leaders can use to determine and reduce the true cost of a data breach.
Tags : 
managed security services, data breach, security, hackers, security, threat and vulnerability management, cost, hacker detection, vulnerability management
    
Secureworks
Published By: QTS     Published Date: Nov 04, 2016
Watch this video to hear from American Hacker, Jeff Moss, about the security threats faced by companies today!
Tags : 
information security, security threats, data security, security, it management, data management
    
QTS
Published By: LifeLock     Published Date: Sep 12, 2016
It only takes one stolen laptop, one employees USB stick, one hacker, one virus, or one careless error to compromise your companys reputation and revenue. The threat of data breach is real and its critical that your company is prepared. A thorough plan that can be executed quickly is essential to comply with relevant regulations, maintain customer loyalty, protect your brand and get back to business as soon as possible.
Tags : 
est practices, identity theft, security, protection, authentication
    
LifeLock
Published By: Kaspersky     Published Date: Aug 17, 2016
Download our eBook to learn what you can expect from the oncoming wave of connected things.
Tags : 
kaspersky, iot, internet security, hackers, cybercrime, wireless security, network security, firewalls, hacker detection, data protection
    
Kaspersky
Published By: MobileIron     Published Date: Aug 04, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Published By: Cisco     Published Date: Jul 11, 2016
Todays corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security.
Tags : 
    
Cisco
Published By: Oracle     Published Date: Jun 20, 2016
The number one technology issue in the C-suite today is cyber-security. And theres no wonderattacks are becoming more numerous and more sophisticated than ever. The cost of cyber-crime to the global economy has topped more than $445 billion2 equivalent to 1% of global GDP. Sometimes cyber-crime can seem unstoppable while firms spent more than $75 billion on cyber-defences in 20153 , cyber-crime grew by 38% that year. Thats why C-suite executives everywhere are asking: What can we do to make a difference in defending against hackers, cyber-criminals and digital spies?
Tags : 
    
Oracle
Published By: Cisco     Published Date: Jun 16, 2016
As much as the Digital Economy and the Internet of Everything (IoE) create opportunities for companies and consumers - over $19 trillion in value to organizations over the next decade - they also create opportunities for hackers and cybercriminals. With an expanded attack surface represented by the IoE, cybercriminals look to cash in on the estimated value of $450 billion to over $1 trillion of the Hacker Economy.
Tags : 
security, technology, digital, cyber attack, data, access control, anti spyware, application security, encryption, internet security
    
Cisco
Published By: Absolute Software     Published Date: May 31, 2016
With companies embracing mobility to maintain competitive advantage in the digital era, information security threats have increased exponentially. Userfriendly technologies such as mobile devices, mobile apps, and cloud storage are often hacker-friendly too, creating opportunities for cybercriminals to covertly infiltrate company data. This opens the door to data loss, reputational damage, loss of proprietary information not to mention the associated regulatory penalties and potential legal fees. IT bears the brunt of responsibility for information security, yet according to Forrester, internal incidents top the list of security breach causes in 2014.
Tags : 
mobility, competitive advantage, best practices, mobile devices, mobile applications, mobile computing, mobile data systems, wireless application software, content management system
    
Absolute Software
Published By: Absolute Software     Published Date: May 31, 2016
This is arguably the most unsettling time in history to be a CIO. The IT landscape is shifting at a rapid pace with advances in social media, mobility and big data. The proliferation of advanced robotics is just around the corner and the Internet of Things is connecting even the most mundane objects to the internetand probably the corporate network. Back in the 1990s, most computer hackers were interested in gaining access to networks purely for kudos among their peers. Today hackers have monetized their skills and make their living from finding vulnerabilities in IT networks.
Tags : 
data, big data, security, corporate network, mobility, application security, best practices, productivity, software compliance
    
Absolute Software
Published By: VMware AirWatch     Published Date: May 19, 2016
In the cacophony of business headlines, news of data security breaches come through like a high-tempo drum beat. In fact, the number of incidents keeps growing at a rate of 66 percent CAGR, with a cost per breach of $5.9 million. And some of the worlds most recognized brands are sustaining bruises to their reputations and harmful hits to their bottom lines as they scramble to repair the damages. Enterprise IT organizations are facing an elusive enemy perpetrators who range from sophisticated cyber criminals and government-sponsored spies to hackers and script kiddies, and who have motives as diverse as money, politics, or simply youthful mischief.
Tags : 
data security, enterprise, data protection, mobile security, anti spyware, access control, application security, hacker detection, identity management, network security appliance, security management
    
VMware AirWatch
Published By: Kaspersky     Published Date: May 11, 2016
As a leader in cybercrime analysis, Kaspersky Labs GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the cybercrime world.
Tags : 
kaspersky, cybercrime, cyber attack, ddos, hackers, roi, security breach, firewall, mobile security, network security, email security, firewalls, hacker detection, internet security, intrusion prevention, security policies, wireless security, return on investment
    
Kaspersky
Published By: LookingGlass Cyber Solutions     Published Date: Apr 26, 2016
The Internet of Things (IoT) is expanding in a dramatic way, bringing to question the issue of availability versus security, as security measures are having a difficult time keeping pace with the development of IoT devices. The introduction of more efficient semiconductors, coupled with revolutionary technology that allows semiconductors to store as well as process complex instructions, means that the IoT may be a more attractive target for hackers. IoT devices from healthcare and industrial systems (i.e., SCADA) could be the most at risk for significant service interruptions and may have secondary and/or tertiary effects on other industries.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
LookingGlass Cyber Solutions
Published By: MobileIron     Published Date: Feb 05, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Published By: Kaspersky     Published Date: Jan 22, 2016
Hardly a day goes by without the discovery of a new cyber threat somewhere in the world! But how do you keep up with new malware and evolving cybercriminal tricks?
Tags : 
kaspersky, cybercrime, hackers, malware, threat protection, network security, firewalls, hacker detection, intrusion prevention, vulnerability management
    
Kaspersky
Published By: Cisco     Published Date: Jan 08, 2016
Financial services organizations have a unique relationship with technology: electronic data and transactions are the core of this industry. Financial services firms remain vigilant because they are constantly under attack. Hackers that gain access to customer accounts or financial data can profit either by using it themselves or by selling it to other criminal organizations. - There are many differences between perception and reality when it comes to security in this industry. For example, its emphasis on fraud prevention creates the perception that financial services is highly evolved in terms of its security readiness. However, this study finds that financial services firms security is on a par with the security of firms in other industries. - Regulations may lead to change and investments, but they also take time to take effect. Organizations should not wait for such requirements before they make improvements. Neither should they assume that compliance gives them full protection. Regulations cannot cover every aspect in such a fast-paced environment.
Tags : 
cisco, financial services, perception gaps
    
Cisco
Published By: ThingWorx     Published Date: Dec 02, 2015
Security is a primary concern of ThingWorx customers especially device manufacturers and end-customers that deliver and use connected products. These customers demand a proven solution that protects them and their customers against hackers, malware and unsafe operations.
Tags : 
thingworx, security, operations, audit, customer, network, networking
    
ThingWorx
Published By: Symantec     Published Date: Nov 30, 2015
Prises pour cible plusieurs reprises en 2011, certaines autorits de certification (AC) ne sont pas sorties indemnes de ces attaques. En tout tat de cause, il ne faut certainement pas sattendre une accalmie sur ce front. Bien au contraire. Les hackers ne cessent de hausser leur niveau de jeu pour perfectionner leurs techniques dexploitation des failles rseaux.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
A lo largo del pasado ao, muchas autoridades de certificacin (CA) han sido vctimas de intrusiones en sus sistemas. Por desgracia, esta amenaza no va a remitir en el futuro; al contrario,los hackers han elevado el listn de sus fechoras, y las tcnicas que utilizan para infiltrarse en redes ajenas son cada vez ms sofisticadas.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Nellanno appena trascorso si assisto a una serie di attacchi riusciti contro alcune autorit di certificazione (CA) e il livello di allarme non sembra destinato a diminuire. Gli hacker diventano sempre pi ingegnosi e le tecniche utilizzate per violare le reti sempre pi sofisticate
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Im Jahr 2011 gab es eine Reihe erfolgreicher Angriffe auf Zertifizierungsstellen und die Bedrohung wird auch in Zukunft sicher nicht nachlassen. Ganz im Gegenteil, Hacker werden immer professioneller und verwenden fr ihre Angriffe auf Netzwerke immer raffiniertere Techniken
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Christmas is coming, the goose is getting fat; Dont give hackers a welcome mat.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
International ttigen nur noch sieben Prozent1 der Verbraucher alle Weihnachtseinkufe im traditionellen Einzelhandel. Neun von zehn Deutschen nutzen das Internet fr einen Teil ihrer Weihnachtseinkufe, jeder Dritte kauft sogar die Mehrheit seiner Geschenke dort.2 Das bedeutet, dass nur die wenigsten Hndler noch auf den OnlineHandel verzichten knnen. Ob Gutscheine, Bestellungen zur Abholung in einer Filiale oder der inzwischen beinahe klassische OnlineEinkauf: Ihre Kunden sind bereit, Ihren virtuellen Gabentisch reich mit Daten und Absatzchancen zu decken. Doch wer die WebsiteSicherheit vernachlssigt, muss stattdessen die Rute in Form von Hackerangriffen und verrgerten Kunden frchten.
Tags : 
    
Symantec
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.