hacker

Results 1 - 25 of 214Sort Results By: Published Date | Title | Company Name
Published By: Absolute Software     Published Date: May 31, 2016
With companies embracing mobility to maintain competitive advantage in the digital era, information security threats have increased exponentially. Userfriendly technologies such as mobile devices, mobile apps, and cloud storage are often hacker-friendly too, creating opportunities for cybercriminals to covertly infiltrate company data. This opens the door to data loss, reputational damage, loss of proprietary information not to mention the associated regulatory penalties and potential legal fees. IT bears the brunt of responsibility for information security, yet according to Forrester, internal incidents top the list of security breach causes in 2014.
Tags : 
mobility, competitive advantage, best practices, mobile devices, mobile applications, mobile computing, mobile data systems, wireless application software, content management system
    
Absolute Software
Published By: Absolute Software     Published Date: May 31, 2016
This is arguably the most unsettling time in history to be a CIO. The IT landscape is shifting at a rapid pace with advances in social media, mobility and big data. The proliferation of advanced robotics is just around the corner and the Internet of Things is connecting even the most mundane objects to the internetand probably the corporate network. Back in the 1990s, most computer hackers were interested in gaining access to networks purely for kudos among their peers. Today hackers have monetized their skills and make their living from finding vulnerabilities in IT networks.
Tags : 
data, big data, security, corporate network, mobility, application security, best practices, productivity, software compliance
    
Absolute Software
Published By: AirDefense     Published Date: Apr 24, 2007
This document outlines how hackers are exploiting vulnerabilities in 802.11 wireless LANs and describes the widely available hacking tools. As a collection of already published risks to wireless LANs, this white paper is written to inform IT security managers of what they are up against.
Tags : 
hackers, hacker, hacker detection, intrusion prevention, wireless security, wlan, wlans, 802.11, wireless lan, monitoring, airdefense
    
AirDefense
Published By: AirTight Networks     Published Date: Nov 30, 1999
Making corporate data accessible through Wi-Fi networks means intruders and other unwanted visitors can easily access such networks if proper precautions and tools aren't used to protect them. This paper will discuss best practices in all five areas to secure the enterprise network, whether wired or wireless.
Tags : 
wireless, best practices, enterprise security, wi-fi, wireless security, network security, intrusion prevention, lan, local area network, local area networking, hacker detection, airtight, airtight networks, wlan, vulnerability management
    
AirTight Networks
Published By: Akamai     Published Date: Mar 10, 2012
This white paper assesses the current cyber-threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos, ddos security, sql injection security, malware, malware protection, malware security, anti phishing, botnets, web application firewall, firewall, compliance, hacker, hacktivism
    
Akamai
Published By: Akamai     Published Date: Mar 10, 2012
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos, ddos security, sql injection security, malware, malware protection, malware security, anti phishing, botnets, web application firewall, firewall, compliance, hacker, hacktivism
    
Akamai
Published By: Akamai Technologies     Published Date: May 05, 2017
Security and performance were once considered separate issues requiring very different solutions. But now that malicious hackers have discovered new and better ways to affect both aspects of a website, you need solutions that can plug security holes while enhancing frontend performance. How is that possible? In this report, we explore browser-based solutions that can beef up security and enhance end-user performance in one stroke. This report examines several techniques for dealing with third party content issues in the browser, including HSTS, iframe, and prefetch. It also dives into service workers and browser-based scripts that provide many security and performance options. Download it now and learn how you can jointly improve security and increase performance.
Tags : 
cyber security, security, web linking, performance
    
Akamai Technologies
Published By: Arbor Networks     Published Date: Mar 13, 2015
As the world becomes more connected, it is no longer enough for enterprises to react once an alert indicates an attacker is inside the network. Instead, with continuous packet capture and threat feeds followed by analysis, it is now possible to hunt the attackers and locate them versus waiting for an alert.
Tags : 
arbor, arbor networks, hackers, cyberattacks, internet security, intrusion prevention, network security, anti virus, hacker detection, intrusion detection, phishing, data protection, vulnerability management
    
Arbor Networks
Published By: Astaro     Published Date: Aug 10, 2009
Hannoush Jewelers Inc., a jewelry manufacturer and retailer, was using frame relay, a private network, but decided to cut costs by moving to VPN tunnels to connect their many stores and offices.
Tags : 
hannoush, jewelery, private network, frame relay, vpn, tunnels, hackers viruses, spam, anti malware, astaro, internet security, content filtering, malware, security, cisco, sonicwall, anti spam, anti spyware, hacker detection, security management
    
Astaro
Published By: Asure Software     Published Date: Nov 06, 2013
The white paper will discuss in greater detail what the cost associated with audits, corporate hackers, tax issues, payroll disputes, and employee lawsuits can be. We will then explore how time management software can resolve the problem, and what the next steps to implementing this technology are.
Tags : 
data security, data storage, payroll security, payroll data, workforce management solutions, workforce management software, time and labor management
    
Asure Software
Published By: AT&T     Published Date: Jul 28, 2015
Download this white paper to learn how AT&T DDoS Defense with KONA Site Defender service can extend protection from origin servers to edge servers for a comprehensive, multi-level approach to security.
Tags : 
at&t, ddos, ddos attack, kona site defender, origin services, security, cybersecurity, hackers
    
AT&T
Published By: AT&T     Published Date: Jul 28, 2015
Read through the AT&T Top Readiness Tips below and see if youre prepared for a DDoS attack and if not, what actions you can take today to get ready.
Tags : 
at&t, ddos, ddos attack, security, preparedness, cybersecurity, hackers
    
AT&T
Published By: AT&T     Published Date: Jul 28, 2015
Download this white paper to learn more about AT&T Threat Manager with Advanced Log Management, a security logging and event correlation monitoring solution for any size organization.
Tags : 
threat manager, at&t, advanced log management, security logging, event correlation monitoring, hackers, cybersecurity
    
AT&T
Published By: bitglass     Published Date: Aug 19, 2014
In this Gigaom Research Webinar, we will separate the real threats from the hype, identify the most common forms of security breaches, and discuss the tools and processes businesses can put in place to minimize exposure and damage.
Tags : 
bitglass, saas, saas security, crm, microsoft, salesforce, identity theft, security breach, hackers, business security, security, network security, access control, hacker detection, identity management, customer relationship management, microsoft exchange, customer experience management, secure content management
    
bitglass
Published By: Black Lotus     Published Date: Apr 21, 2014
Newly updated for April 2014 with Q1 attack data, download the latest DDoS Threat Advisory from Black Lotus to learn about the latest threats facing your company.
Tags : 
black lotus, black lotus communications, ddos, denial of service, security threat, hackers, spam, fishing, firewall, intrusion, mobile secuirty, network security, firewalls, hacker detection, internet security, intrusion prevention, data protection
    
Black Lotus
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
From the Era Before security to this current era of empowerment this infographic from BlueCoat provides a timeline navigates the rise of web commerce and the rise in securities which protect us. Starting with when web commerce began to grow and hackers took notice to now when Web Security is able to empower businesses.
Tags : 
idc, security, bluecoat, web security, hackers, application security, email security, hacker detection, internet security, web service security
    
Blue Coat Systems
Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
At the Defcon security conference on August 2007, a hacker and Defcon staffer who goes by the name Zac Franken, showed how a small homemade device he calls "Gecko", which can perform a hack on the type of access card readers used on office doors throughout the country.
Tags : 
security, security management, access control, identity management, iam, authentication, wiegand, tracking, workforce, workforce management, employee management, borer, access control, wiegand, security, borer, borer data systems, hacker, defcon, zac franken
    
Borer Data Systems Ltd.
Published By: CA Technologies     Published Date: Jun 01, 2018
Challenge Businesses today must reduce the risk of security breaches to protect the valuable data within their organizations. At the same time, IT auditors are increasingly enforcing ever more stringent requirements on the business. The bottom line is that privileged accounts and privileged access are being targeted by hackers as a new attack surface and focused on by auditors who are insisting on greater controls around privileged accounts. Opportunity The right privileged access management solution provides comprehensive protection for your missioncritical servers with powerful, fine-grained controls over operating system-level access and privileged user actions. Capable of enforcing access controls on powerful native Superuser accountslike the UNIX and Linux root and Microsoft Windows administratorthis system-level, host-based privileged access management solution controls, monitors and audits privileged user activity, improving security and simplifying audit and compliance. B
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
Sie haben es jetzt auf wertvolle Daten abgesehen, die online oder ber mobile Gerte zugnglich sind.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
The misuse or takeover of privileged accounts constitutes the most common source of breaches today. CA Threat Analytics for PAM provides a continuous, intelligent monitoring capability that helps enterprises detect and stop hackers and malicious insiders before they cause damage. The software integrates a powerful set of user behavior analytics and machine learning algorithms with the trusted controls provided by CA Privileged Access Manager (CA PAM). The result is a solution that continuously analyzes the activity of individual users, accurately detects malicious and high-risk activities and automatically triggers mitigating controls to limit damage to the enterprise.
Tags : 
    
CA Technologies EMEA
Published By: Carbonite     Published Date: Feb 22, 2017
Refuse to surrender to cybercriminalslearn the best ways to prevent a ransomware infection, and what you can do in the event of an attack.
Tags : 
backup and recovery, business backup, cloud backup, computer backup, hybrid backup, data backup, data protection, data recovery, disaster recovery, hacker, computer hacking, malware, ransomware, ransomware attack, ransomware defense, ransomware infection, ransomware preparedness, ransomware prevention, ransomware protection
    
Carbonite
Published By: CDW     Published Date: Nov 13, 2012
The standard can help organizations improve handling of personally identifiable information.
Tags : 
cdw, pci, dss, compliance, cybersecurity attack, hacker attacks, verizon, pos, point of sales
    
CDW
Published By: Centrify Corporation     Published Date: Apr 13, 2018
With compromised credentials as todays #1 threat vector, and the premium hackers place on privileged access, status quo is a treacherous security path to remain on. This eBook looks at whats behind the privilege crisis, helps you assess how your privileged access management strategy stacks up and proposes a rethink in your approach one that better addresses the needs of the hybrid enterprise. It explores ways to strengthen your companys identity maturity with a Zero Trust approach and proven best practices that reduce your risk of a security breach.
Tags : 
    
Centrify Corporation
Published By: Cenzic     Published Date: Nov 30, 2006
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking.  Find out how Cenzic's powerful security solutions help information security teams quickly identify problems, regularly assess web application security strength and ensure regulatory compliance.
Tags : 
application security, vulnerabilities, vulnerability management, security complinace, compliance, regulatory compliance, it spending, hacker detection, cenzic, security, auditing, authentication, encryption, firewalls, identity management, internet security, intrusion detection, intrusion prevention, policy based management, security management
    
Cenzic
Start   Previous   1 2 3 4 5 6 7 8 9    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.