data security breach

Results 1 - 25 of 108Sort Results By: Published Date | Title | Company Name
Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your companys network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the worlds leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your companys network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies
Published By: Alert Logic     Published Date: May 23, 2019
A Payment Card Industry Data Security Standard (PCI DSS) audit can be passed by complying with the bare minimum requirements, but that falls short of the purpose of it: to secure and protect cardholder data. Meeting compliance is about passing an audit at a specific point in time and also maintaining it after the audit. The real challenge is sustaining continuous compliance to avoid costly breaches at the hands of motivated and skilled adversaries. Indeed, as detailed in Verizon's "2017 Payment Security Report," nearly half (45%) of the companies examined between 2015 and 2016 were not fully PCI DSS compliant.
Tags : 
    
Alert Logic
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isnt showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a companys internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a companys data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Published By: Dell EMC     Published Date: May 09, 2019
Data security is a top priority and a daunting challenge for most organizations. Costly data breaches are incresing in number and sophiscation, and a growing list of regulations mandate that personal data be protected. At the same time, security technologies must not impede user productivity by creating obstacles or slowing performance, otherwise users might disable or circumvent them. A robust security strategy that includes authentication, encryption and advanced malware prevention enables an organization to keep data safe while enabling the way people work. Dell has conceived and executed an innovative securtiy strategy that provides date protection and threat prevention across an extensive line of products. Download this white paper from Dell and Intel to learn more.
Tags : 
    
Dell EMC
Published By: Panasonic     Published Date: Apr 23, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum. Federal agencies are no strangers to cybersecurity attacks, and several recent high-profile breaches involving mobile devices demonstrate ongoing vulnerabilities in governments expanding network of endpoints. This issue brief describes what can be done to protect devices, data and networks, including multi-factor authentication to authorization controls and user education.
Tags : 
    
Panasonic
Published By: Intel     Published Date: Apr 11, 2019
The Internet of Things (IoT) unleashes valuable business insights through data thats gathered at every level of a retail organization. With IoT and data analytics, retailers now have the capability to gather insight into customer behavior, offer more personalized experiences, achieve better inventory accuracy, create greater supply chain efficiencies, and so much more. But with data comes great risk. A recent report by security firm Thales and 451 Research found that 43 percent of retailers have experienced a data breach in the past year, with a third reporting more than one breach.1 Intel technology-based gateways and Asavie, a provider of next-gen enterprise mobility management and IoT connectivity solutions, offer a security connectivity solution that minimizes the effort and cost to businesses to ensure safety from cybersecurity attacks. In addition, the Intel/Asavie IoT solution provides retailers with a solid basis to build their smart, connected projects:
Tags : 
    
Intel
Published By: CheckMarx     Published Date: Apr 03, 2019
Data breaches continuing to make the headlines and enterprises are no longer questioning "if" a breach will occur, but "when." With the organization's data assets and reputation at stake, having a breach response plan in place is becoming increasingly important. Join security thought leaders and experts for an interactive Q&A to learn more about: - Todays cybersecurity threat landscape - The true costs of a breach - Preventing breaches: Key factors to consider - Why early breach detection is critical - How to develop an effective incident response plan and get C-Suite buy-in - How to keep your company secure in 2019"
Tags : 
    
CheckMarx
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Limiting access to confidential client files is vital. But choosing the wrong document security solution can overwhelm your staff (and your IT department) and leave your data vulnerable. Learn five important features a security solution should offer.
Tags : 
legal document management, best legal document management systems, law firm data breach, law firm security breach, law firm data security, legal document automation software
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Printers, scanners, mobile devices Its hard to imagine running a law office without them, but you should know they can expose your client data to theft or misuse. Learn why your office technology may not be as secure as you think.
Tags : 
legal document management, best legal document management systems, law firm data breach, law firm security breach, law firm data security, legal document automation software
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Security threats can be next to invisible, but this infographic shows exactly where your healthcare organization can be most at risk. It also gives you valuable tips for helping secure your patient data, financial documents, and medical records.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist, hipaa security, how to be hipaa compliant, hipaa compliant printing, healthcare data breach, security breaches in healthcare
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Fully updated for 2019, this guide covers the latest technologies and best practices for print, device, document, information, and cybersecurity. Learn how you can help maintain the confidentiality, integrity, and availability of health records throughout your organization.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist, hipaa security, how to be hipaa compliant, hipaa compliant printing, healthcare data breach, security breaches in healthcare
    
Canon Solutions America
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, youll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. Thats why its essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, youll enjoy better visibility, increased performance, and more flexibilityso you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, youll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. Thats why its essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, youll enjoy better visibility, increased performance, and more flexibilityso you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Gigamon     Published Date: Dec 13, 2018
Despite increasing security budgets, companies find there is too much data for new tools to analyze, not enough skilled IT security professionals and little confidence in current technology investments. Read the 2018 Cyberthreat Defense Report to learn how your peers are managing increased breaches, vulnerabilities and encrypted traffic. How does your cyberthreat approach compare to other security pros who are protecting their organizations? Learn now.
Tags : 
    
Gigamon
Published By: Group M_IBM Q418     Published Date: Nov 13, 2018
The financial industry is experiencing a significant challenge when it comes to maintaining and establishing trust in its relationships with clients. Customers battered by the constant barrage of publicized data incursions and security breaches are highly sensitized to those signs in their own dealings. They find it difficult to accept any disruption in either their business or their personal financial activities and are easily frightened away from organizations that they perceive as risky.
Tags : 
    
Group M_IBM Q418
Published By: MobileIron     Published Date: Nov 07, 2018
In recent years, the market for mobile and cloud technologies has completely shifted the behavior of enterprise users. People can now work anywhere, on any device, to access business apps and data from mobile apps and cloud services. Static, perimeter-based security can no longer keep up with all of the endpoints, users, apps, and data that travel far beyond the corporate firewall. Relying on old security approaches like password-only access control is no longer enough to secure this vast mobile-cloud infrastructure especially since stolen user credentials were the top cause of data breaches in 2017.
Tags : 
    
MobileIron
Published By: BigCommerce     Published Date: Oct 16, 2018
Whether your company has been selling online for 20 minutes or 20 years, you are undoubtedly familiar with the PCI DSS (Payment Card Industry Data Security Standard). It requires merchants to create security management policies and procedures for safeguarding customers payment data. Originally created by Visa, MasterCard, Discover, and American Express in 2004, the PCI DSS has evolved over the years to ensure online sellers have the systems and processes in place to prevent a data breach.
Tags : 
    
BigCommerce
Published By: Dell EMC & Intel     Published Date: Sep 06, 2018
For organisations that aim to modernise their IT environments and limit operational risks that can incur costs, IDC recommends making data protection initiatives a top priority. Modernise data protection to cut IT costs and advance IT Transformation. Modern data protection enables organisations to shrink data backup and recovery windows , which means fewer security breaches and faster resolutions when they do happen. To truly transform IT, modernise your data center to increase IT efficiency and shed technical debt while protecting your bottom line. Drive IT Transformation and results with leading enterprise solutions from Dell EMC powered by Intel.
Tags : 
    
Dell EMC & Intel
Published By: Google     Published Date: Aug 23, 2018
"From APIs to employee-owned smartphones, there are more access points to corporate data than ever before. Have businesses updated their security strategies to reflect this explosion of new targets for potential breaches? In June 2017, Google commissioned Forrester Consulting to examine how security experts think about endpoint security and learn how the cloud is helping businesses address new vulnerabilities. Download the Forrester report and find out more."
Tags : 
    
Google
Published By: Butler Technologies     Published Date: Jul 02, 2018
Increasingly complex networks, require more than a one-size-fitsall approach to ensuring adequate performance and data integrity. In addition to the garden-variety performance issues such as slow applications, increased bandwidth requirements, and lack of visibility into cloud resources, there is also the strong likelihood of a malicious attack. While many security solutions like firewalls and intrusion detection systems (IDS) work to prevent security incidents, none are 100 percent effective. However, there are proactive measures that any IT team can implement now that can help ensure that a successful breach is found quickly, effectively remediated, and that evidential data is available in the event of civil and/or criminal proceedings.
Tags : 
    
Butler Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Within any organization, the most dangerous users are those with privileged access to the companys most valuable and sensitive data assets. This includes systems administrators, business managers, partners, suppliers, and service providers, and also takes into account the automated interactions between business machines, systems, and applications. Privileged access has always been a high-risk issue, but for too long, organizations have not understood or have chosen to ignore the risks, preferring instead to rely on the integrity of the individuals and systems involved. A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solution
Tags : 
    
CA Technologies
Published By: CrowdStrike     Published Date: May 10, 2018
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the proverbial needle in the haystack the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. In this context, detecting attacks is often difficult, and sometimes impossible. This white paper describes how CrowdStrike solved this challenge by building its own graph data model the CrowdStrike Threat Graph? to collect and analyze extremely large volumes of security-related data, and ultimately, to stop breaches. This revolutionary approach applies massive graph-based technologies, similar to the ones developed by Facebook and Google, to detect k
Tags : 
    
CrowdStrike
Published By: Mimecast     Published Date: Apr 13, 2018
On the 13th February 2017, the Privacy Amendment (Notifiable Data Breaches) Act was passed in the Australian Parliament, introducing a mandatory notification regime. This bill commences on the 23rd February 2018 and will require organisations to notify data subjects and regulators in the event of an eligible data breach. Mimecasts proven portfolio of cloud-based, security and cyber resilience services for email can be a vital component of any organisations Notifiable Data Breaches compliance strategy
Tags : 
    
Mimecast
Published By: McAfee EMEA     Published Date: Mar 14, 2018
Use of cloud computing services continues to grow rapidly as organizations migrate business applications and data to cloud-based software, platform and infrastructure services. Gartner estimates 2017 will see growth of 18% in spending on public cloud services and that cloud adoption will infuence more than 50% of IT spending through 2020. Deloitte Global predicts that by the end of 2022 more than half of all IT spending will go to IT-as-a-service providers. In the 2016 edition of this survey, 56% of the security professionals responding said limitations on access to collect incident response data and evidence for forensic analysis was a key challenge to securing the cloud. Sixty-two percent said they were concerned about unauthorized access by outsiders, and 59% said they worried about access by other cloud tenants. Of the 10% who reported being breached, half blamed stolen credentials or compromised accounts.
Tags : 
    
McAfee EMEA
Published By: Brother     Published Date: Mar 08, 2018
The last decade has seen many exciting advances in connectivity accelerated by the near universal availability of smartphones and tablets leading to a highly interconnected world. The security of networks - and the businesses and individuals that rely on them - has become top of mind for the IT Security professionals who are responsible for ensuring the safety of the data and the networks where this information is utilized. As high-visibility security breaches occur - affecting ecommerce, banking, retail and other industries - the critical importance of the security of the infrastructure these businesses rely on continues to grow. Security in the workplace is a daily fact of life. From using ID cards to control physical access, to entering passwords to join the network, to using software to monitor and prevent unauthorized access, all are routinely used to protect critical assets and information. However, there is one key area where many organizations still have potential vulnerabili
Tags : 
network security, security breaches, pci, dss, hippa
    
Brother
Start   Previous   1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.