cybersecurity

Results 1 - 25 of 188Sort Results By: Published Date | Title | Company Name
By: Group M_IBM Q1'18     Published Date: Jan 16, 2018

Internally developed software applications support the most sensitive and strategically important business processes of most enterprises. Yet application security is one of the most neglected fields of cybersecurity.

Tags : risk-based application security, security management, application security, software applications
    
By: Mimecast     Published Date: Aug 22, 2017

Navigating a turbulent cybersecurity climate can be hard – especially as threats like Petya and WannaCry continue to cripple organizations. Business disruption, downtime, technical failure and data loss are all real risk factors that can’t be ignored. The power of preparedness is in your hands. Get expert insight, tips and guidance from industry thought leaders on how to build a cyber resilience plan for email in this e-book.

Tags : cyber resilience, petya, wannacry, cybersecurity
    
By: Mimecast     Published Date: Feb 07, 2018

Is your healthcare organization part of the 90% that conducts annual cybersecurity assessments?* Do you wonder where your IT peers are headed with their cybersecurity plans and how they prioritize their initiatives? Recent HIMSS survey results reveal these insights and more, plus the 5 steps to improve your email security’s prognosis. This E-book contains startling facts and important cybersecurity insights every healthcare IT security leader needs to know. *HIMSS Analytics survey conducted on behalf of Mimecast, December 2017

Tags : himss, email security, email, healthcare, cybersecurity
    
By: iboss     Published Date: Jan 22, 2018

Choosing the right cybersecurity solution has never been more important. Organizations need to understand why all security technologies are not alike.

Tags : iboss, cybersecurity, intrusion detection, security, cyberattack, network security, hacker detection, intrusion prevention
    
By: iboss     Published Date: Jan 22, 2018

On behalf of iboss, Researchscape conducted an online survey of 104 U.S. IT executives at large enterprises to better understand attitudes and initiatives for addressing cybersecurity.

Tags : iboss, remote access, byod, cybersecurity, mobile workforce, network security, vpn, access control
    
By: QTS     Published Date: Nov 04, 2016

Healthcare accounts for 21% of all cybersecurity breaches, making it the most affected business sector in the U.S. economy. Ongoing attacks are predicted to cost providers $305 billion in lifetime revenue over the next few years. Download this white paper to learn how to make healthcare cybersecurity stronger.

Tags : healthcare, cyber security, data security, security
    
By: Akamai Technologies     Published Date: May 05, 2017

To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing website infrastructure or within a data center with security measures in the cloud for a more robust security posture. We share Akamai’s approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics — so you can make more educated decisions about the best solutions for your needs.

Tags : cloud security, data, akamai
    
By: Cisco     Published Date: Jul 08, 2016

Disruptors now harness the power of digital to create new sources of value that reduce costs, improve the customer experience, and scale their offerings. Digital disruptors also enjoy a decided innovation advantage over established companies: they are better able to identify new opportunities, and move faster to take advantage of them. In this intensely competitive environment, startups and agile firms are overturning incumbents with digital business models, products, and services.

Tags : 
    
By: Cisco     Published Date: Oct 11, 2016

The Cisco® 2016 Midyear Cybersecurity Report—which presents research, insights, and perspectives from Cisco Security Research—updates security professionals on the trends covered in our previous security report while also examining developments that may affect the security landscape later this year.

Tags : cybersecurity, attackers, http, ransomeware, malware, hacker detection, internet security, network security appliance
    
By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016

MIT Technology Review Survey: Executive Summary Are you prepared for the next breach? Only 6% of leaders say yes. Information security—or, the lack of it—is firmly on the radar for business and IT leaders in organizations of all sizes and in every sector. Many fear that their companies are ill-prepared to prevent, detect, and effectively respond to various types of cyberattacks, and a shortage of in-house security expertise remains of widespread concern. Those are among the initial findings of the Cybersecurity Challenges, Risks, Trends, and Impacts Survey, conducted by MIT Technology Review of approx. 225 business and IT executives, in partnership with Hewlett Packard Enterprise Security Services and FireEye Inc.

Tags : 
    
By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016

Is your organization prepared for a cyberattack? Most aren’t. 86% of organizations surveyed lack adequate cybersecurity capabilities. Read MIT Technology Review’s latest infographic, based on their survey of 225 business and IT leaders, and learn if you have cybersecurity holes and how to patch them.

Tags : 
    
By: Spectrum Enterprise     Published Date: Feb 07, 2018

Partnering with Spectrum Enterprise sustains client loyalty by instilling confidence in how the bank operates, provides superior network service level agreements that ensure minimal downtime and assures smoother state and FDIC audits thanks to cybersecurity safeguards such as built-in redundancy and private network service.

Tags : 
    
By: Gigamon     Published Date: Oct 19, 2017

Read the IDG Tech Dossier, A Security Delivery Platform Benefits the Entire Organization to learn how a comprehensive, well-integrated security platform provides the foundation for the next generation of cybersecurity. By uniting a variety of security solutions and appliances for efficient operation through network visibility and security workflow orchestration, organizations benefit from continuous and pervasive network visibility, fault tolerance and scaling and optimal CPU utilization – thereby improving security and reducing cost. Download now!

Tags : 
    
By: Akamai Technologies     Published Date: Aug 17, 2017

The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Businesses are increasingly relying on the cloud for cybersecurity for two key reasons: 1. Due to a changing threat landscape, there’s a need for more scale, accuracy, experience, and collective intelligence. These resources are out of reach internally for most organizations. 2. There are fundamental limits with on-premises hardware mitigation appliances and enterprise data centers for Distributed Denial of Service (DDoS) and web attack protection.

Tags : cloud security, scale, data center, ddos
    
By: KeyBank Commercial Banking     Published Date: May 10, 2017

When it comes to the middle market, Key has a dedication like no other bank. Our commitment and focus allow us to deliver relevant, actionable, and tailored solutions for middle market companies. As part of this commitment, KeyBank conducts quarterly surveys with middle market executives. We believe that the more we know, the better we can serve you. Check out what leaders are saying about the economy, future growth and cybersecurity when you download our latest quarterly report. Member FDIC. © 2017, KeyCorp. CFMA 20170424- 224928

Tags : middle market, us economy, economic outlook, customized solutions, cybersecurity, business success, business goals, business expansion
    
By: Dell EMC     Published Date: Feb 23, 2017

Desktop and application virtualization have steadily gained ground to address a broad range of use cases across organizations of all sizes. According to ESG research, over the past few years, desktop virtualization has consistently risen to be included among the five most commonly-identified IT priorities, alongside such perennial corporate objectives as fortifying cybersecurity and managing data growth.

Tags : 
    
By: Akamai Technologies     Published Date: Aug 17, 2017

To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing infrastructure within the data center with security measures in the cloud for a more robust web security posture. We also share Akamai’s approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics — so you can make more educated decisions about the best solutions for your needs.

Tags : cloud security, buyer's guide, data safety, cybersecurity
    
By: Venafi     Published Date: Aug 10, 2015

This whitepaper reveals how Security Operations teams can eliminate these outages.

Tags : security, security operations, outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks, data protection
    
By: VMware     Published Date: Oct 05, 2015

Security breaches targeting government and military data centers are increasing. Attackers have learned to defeat current means of physical network security, which emphasize perimeter defense. Today, organizations must protect the workloads inside the data center, utilizing a concept called micro-segmentation to build a “Zero Trust” network. But that has been unrealistic, requiring too great an investment in hardware, time, and manpower — until now, that is. Download this use case from VMware and Carahsoft® now to learn why.

Tags : vmware, cybersecurity, vmware nsx, security breach solutions, microsegmentation, zero trust, zero trust network, carahsoft
    
By: Cisco     Published Date: Mar 17, 2017

The Cisco 2017 Annual Cybersecurity Report presents research, insights, and perspectives from Cisco Security Research. This research can help your organisation respond effectively to today’s rapidly evolving and sophisticated threats.

Tags : cyber security, threat and vulnerability management, security, attacks, threat detection
    
By: Cisco     Published Date: Sep 14, 2017

For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency

Tags : 
    
By: Cisco     Published Date: Sep 21, 2017

For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency. In these reports, we strive to alert defenders to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information, and create disruption. Download this whitepaper to find out more.

Tags : cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
By: Panasonic     Published Date: Aug 04, 2016

Cybersecurity is top of mind for companies with workers using mobile computing devices. Report identifies top field service security risks, why security policies are critical, and includes a security checklist.

Tags : cyber risk, security, mobile security, best practices, business management
    
By: Secureworks     Published Date: Nov 11, 2016

This paper explores why the older “all or nothing” kind of relationship between business organisations and information security services providers (ISSPs) is giving way to a hybrid model that security professionals can leverage to augment their operations and effectiveness.

Tags : managed security services, cybersecurity, issps, security, threat and vulnerability management, vulnerability management
    
By: Secureworks     Published Date: Dec 09, 2016

The included Framework for Inquiry is a non-prescriptive exercise that can help boards and management craft a replicable reporting template for reviewing risk levels, measuring operational effectiveness, and prioritizing initiatives over time.

Tags : cybersecurity, managed security services, security, threat and vulnerability management, risk management, vulnerability management
    
Start   Previous   1 2 3 4 5 6 7 8    Next    End