Hacker Detection White Papers

Hacker in a security context refers to a type of computer hacker who is involved in computer security/insecurity and is able to exploit systems or gain unauthorized access through skills, tactics and detailed knowledge.
Results 1 - 25 of 363Sort Results By: Published Date | Title | Company Name
By: iboss     Published Date: Jan 22, 2018

Choosing the right cybersecurity solution has never been more important. Organizations need to understand why all security technologies are not alike.

Tags : iboss, cybersecurity, intrusion detection, security, cyberattack, network security, hacker detection, intrusion prevention
    
By: iboss     Published Date: Jan 22, 2018

On behalf of iboss, Researchscape conducted an online survey of 104 U.S. IT executives at large enterprises to better understand attitudes and initiatives for addressing cybersecurity.

Tags : iboss, remote access, byod, cybersecurity, mobile workforce, network security, vpn, access control
    
By: RSA     Published Date: Sep 19, 2017

This paper sets out five basic steps organizations may want to consider to help set up a framework for managing GDPR risk.

Tags : rsa, rsa security, data breach, data protection, gdpr, network security, compliance, email security
    
By: Thales     Published Date: Jul 13, 2017

Watch expert Nancy Spizzo for an informative recorded webinar, where she'll use real-world examples to highlight best practices and dispel myths about patient data protection. Spizzo will also discuss current trends in healthcare data security and HIPAA enforcement.

Tags : thales, data protection, health records, data security, hippa, hacker detection, intrusion prevention, best practices
    
By: Kaspersky     Published Date: Feb 06, 2017

Kaspersky Lab together with B2B International conducted a global study of more than 4,000 business representatives from 25 countries.

Tags : kaspersky, cyber crime, data loss, business security, network security, email security, hacker detection, internet security
    
By: Kaspersky     Published Date: Feb 06, 2017

As its name suggests, ransomware is a specific type of malware that tries to extract a ransom payment in exchange for unblocking access to an asset that belongs to the victim. Download our eBook now to learn how to protect your business from this security threat.

Tags : ransomware, malware, encryption, cyberthreat, hacker detection, intrusion prevention, mobile data systems, smart phones
    
By: Kaspersky     Published Date: Feb 06, 2017

The total amount of damage caused by cryptomalware can be divided into two parts: the ransom and the related losses. Drawing from our survey of over 4,000 small- and medium-sized companies conducted by Kaspersky Lab and B2B International, we take a closer look at the numbers behind the damage.

Tags : cryptor, ransomware, malware, encryption, business security, cyberthreat, cyberattack, hacker detection
    
By: GE Power     Published Date: Jan 27, 2017

Don’t wait to implement your cyber protection program. An excellent place to begin developing your approach is with the newly published The U.S. Homeland Security Strategies for Defending Industrial Control Systems. See the 7 recommended strategies and learn and how digital solutions can help fulfill steps toward a more secure operating environment.

Tags : cyber security, power plants, utilities, power producers, power plant, cyber attacks, power grids, power industry
    
By: Secureworks     Published Date: Nov 11, 2016

This paper takes an in-depth look at the true costs — both short and long term — of a data breach, and provides steps and tips that executive teams and security leaders can use to determine and reduce the true cost of a data breach.

Tags : managed security services, data breach, security, hackers, security, threat and vulnerability management, cost, hacker detection
    
By: Kaspersky     Published Date: Oct 26, 2016

Download our eBook Healthcare Ransomware: Hospitals on Hold to learn the measures your hospital or healthcare organization can put in place to ensure that this menace does not happen to you.

Tags : kaspersky, hospital records, healthcare security, secure data, cybercrime, hacker detection, intrusion detection, intrusion prevention
    
By: Lenovo     Published Date: Oct 14, 2016

Get the details on the top threats to IT Security. This detailed (and entertaining) eBook provides you with the key stats you need to identify and stay ahead of the top six threats to IT security today—from ransomware to phishing and spyware to DDoS attacks. Download the eBook to get all the details!

Tags : security, ransomware, spyware, malware, theft, it threat, anti spyware, ddos
    
By: Cisco     Published Date: Oct 11, 2016

The Cisco® 2016 Midyear Cybersecurity Report—which presents research, insights, and perspectives from Cisco Security Research—updates security professionals on the trends covered in our previous security report while also examining developments that may affect the security landscape later this year.

Tags : cybersecurity, attackers, http, ransomeware, malware, hacker detection, internet security, network security appliance
    
By: IBM     Published Date: Oct 06, 2016

Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months and can cost an organization an average of 11 million USD.

Tags : cyber security, security analysis, integrated data systems, cyber intelligence, malware investigation, hacker detection, internet security, web service security
    
By: IBM     Published Date: Oct 06, 2016

Defensive weak spots are just waiting to be found and exploited by persistent cyber attackers. But with cyber threat analysis, you quickly identify, disrupt and mitigate breaches by uncovering critical insights unseen by traditional defenses.

Tags : cyber security, threats, enterprise insight analysis, data computation, intelligence, hacker detection, internet security, intrusion detection
    
By: IBM     Published Date: Oct 06, 2016

IBM® i2® Analyst’s Notebook® provides rich visual analysis capabilities that help to quickly turn complex sets of disparate information into high-quality, actionable intelligence. It is designed to help analysts, and others involved in intelligence analysis, identify, predict, and prevent criminal, terrorist and fraudulent activities.

Tags : cyber security, intelligence, prevention, ibm, data protection, network management, hacker detection, internet security
    
By: NAVEX Global     Published Date: Aug 18, 2016

This Cyber Security Awareness Kit illustrates how to make your organisation more secure by neutralizing the leading cause of cyber security risk: your employees.

Tags : cyber attack, risk, cyber security, cyber criminals, cyber risks, security, security application, cyber security awareness kit
    
By: Kaspersky     Published Date: Aug 17, 2016

Find the answers you need to know by downloading our new ebook. We’ll break down the statistics on the biggest threats that enterprises face and how you can defend your business.

Tags : kaspersky, threat management, vulnerability, external threat, hacker detection, intrusion prevention, it spending, data protection
    
By: Kaspersky     Published Date: Aug 17, 2016

Download our eBook to learn what you can expect from the oncoming wave of connected “things.”

Tags : kaspersky, iot, internet security, hackers, cybercrime, wireless security, network security, firewalls
    
By: Centrify     Published Date: May 26, 2016

Many organizations are turning to multi-factor authentication (MFA) or two-factor authentication (2FA) to reduce the risk of stolen passwords. This paper examines best practices for deploying MFA

Tags : authentication, multi-factor authentication, threat protection, cyber attacks, hacker detection, identity management, security management
    
By: Centrify     Published Date: May 26, 2016

This paper examines how securing identity is at the center of protecting your users, systems and data. In fact, today’s threats require a next-generation identity platform. And how Centrify secures enterprise identities through the Centrify Identity Platform.

Tags : data security, security, cyber attacks, threat and vulnerability management, access control, application security, hacker detection, security management
    
By: Kaspersky     Published Date: May 11, 2016

You don't have to be a victim of ransomware. Get the facts you need to protect your company.

Tags : kaspersky, ransomware, encyyption, data access, email security, company security, network security, access control
    
By: Kaspersky     Published Date: May 11, 2016

As a leader in cybercrime analysis, Kaspersky Lab’s GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the cybercrime world.

Tags : kaspersky, cybercrime, cyber attack, ddos, hackers, roi, security breach, firewall
    
By: Code42     Published Date: Apr 22, 2016

The study’s findings highlight discrepancies—between IT departments and end users—in the approach and attitudes toward data protection. The results provide compelling evidence that there is vast room for improvement in securing critical data flowing between the corporate enterprise and endpoint devices. Read this paper to find how to protect your data today.

Tags : datastrophe study, code 42, data protection, data backups, anti spyware, anti virus, application security, authentication
    
By: Code42     Published Date: Apr 22, 2016

Read this whitepaper to find out strategic solutions to your data protection issues.

Tags : data protection, data control, code 42, data visibility, encryption, hacker detection, network security appliance, security management
    
By: Akamai Technologies     Published Date: Mar 10, 2016

When your Internet-facing network comes under DDoS attack, does your entire organization panic – or does everyone know exactly what to do? Read this whitepaper to learn how to protect network assets, websites, and web applications against DDoS attacks and best practices for adding DDoS mitigation to a corporate incident response plan.

Tags : ddos mitigation, best practices, akamai technology, cyberdefense, cyber security, anti spam, anti virus, ddos
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End