Internet Security White Papers

Computer Security is a highly complex field, and it is relatively immature, except on certain very secure systems that never make it into the news media because nothing ever goes wrong that can be publicized, and for which there is not much literature because the security details are proprietary. The ever-greater amounts of money dependent on electronic information make protecting it a growing industry and an active research topic.
Results 1 - 25 of 756Sort Results By: Published Date | Title | Company Name
By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009

Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.

Tags : ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities
    
By: Nuance Communications     Published Date: Jun 17, 2009

The response to possible bank card fraud is one of the most important factors affecting the relationship that customers have with their bank. For customer-centric financial institutions who issue millions of bank cards, any instance of possible fraud is both a business risk to be managed and an opportunity to strengthen customer relationships.

Tags : nuance, retail banking, fraud, identify, contact, theft, outbound, business risk
    
By: RSA     Published Date: Sep 19, 2017

This must-read report featuring insights from respected legal and security experts outlines specific GDPR compliance challenges you probably haven’t considered.

Tags : rsa, rsa security, gdpr, data protection, compliance, network security, internet security, intrusion detection
    
By: RSA     Published Date: Sep 19, 2017

Download the white paper to learn more about GDPR and its implications for your cybersecurity strategy.

Tags : rsa, rsa security, cybersecurity, data protection, compliance, eu compliance, gdpr, internet security
    
By: Kaspersky     Published Date: Feb 06, 2017

Kaspersky Lab together with B2B International conducted a global study of more than 4,000 business representatives from 25 countries.

Tags : kaspersky, cyber crime, data loss, business security, network security, email security, hacker detection, internet security
    
By: Grey Matter     Published Date: Jan 31, 2017

This eBook shows how Grey Matter enables businesses to be more successful by offering the right solutions – to be more agile, more productive, and protected against threats to security and continuity – for today and tomorrow.

Tags : cloud, cloud computing, data, security, data security, data safe, cyber attacks, anti spam
    
By: Grey Matter     Published Date: Jan 13, 2017

This eBook shows how Grey Matter enables businesses to be more successful by offering the right solutions – to be more agile, more productive, and protected against threats to security and continuity – for today and tomorrow.

Tags : cloud, cloud computing, data, security, data security, data safe, cyber attacks, anti spam
    
By: Kaspersky     Published Date: Oct 26, 2016

Download Kaspersky Lab’s Security in the Cloud Snapshot* to learn about the most pressing cloud security issues and how you can address them.

Tags : kaspersky, cloud security, critical operations, endpoint security, network security, internet security, cloud computing
    
By: Lenovo     Published Date: Oct 14, 2016

Get the details on the top threats to IT Security. This detailed (and entertaining) eBook provides you with the key stats you need to identify and stay ahead of the top six threats to IT security today—from ransomware to phishing and spyware to DDoS attacks. Download the eBook to get all the details!

Tags : security, ransomware, spyware, malware, theft, it threat, anti spyware, ddos
    
By: Lenovo     Published Date: Oct 14, 2016

IT rightly focuses on virtual data threats. But, how important are physical threats to your data? Explore the many physical threats your data and devices face in and out of the workplace, and find out how Lenovo can help you protect against them with devices built to be secure from the ground up. Get the eBook now.

Tags : security, usb, endpoint protection, theft, it threat, internet security, network security appliance, vulnerability management
    
By: Cisco     Published Date: Oct 11, 2016

The Cisco® 2016 Midyear Cybersecurity Report—which presents research, insights, and perspectives from Cisco Security Research—updates security professionals on the trends covered in our previous security report while also examining developments that may affect the security landscape later this year.

Tags : cybersecurity, attackers, http, ransomeware, malware, hacker detection, internet security, network security appliance
    
By: IBM     Published Date: Oct 06, 2016

Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months and can cost an organization an average of 11 million USD.

Tags : cyber security, security analysis, integrated data systems, cyber intelligence, malware investigation, hacker detection, internet security, web service security
    
By: IBM     Published Date: Oct 06, 2016

Defensive weak spots are just waiting to be found and exploited by persistent cyber attackers. But with cyber threat analysis, you quickly identify, disrupt and mitigate breaches by uncovering critical insights unseen by traditional defenses.

Tags : cyber security, threats, enterprise insight analysis, data computation, intelligence, hacker detection, internet security, intrusion detection
    
By: IBM     Published Date: Oct 06, 2016

IBM® i2® Analyst’s Notebook® provides rich visual analysis capabilities that help to quickly turn complex sets of disparate information into high-quality, actionable intelligence. It is designed to help analysts, and others involved in intelligence analysis, identify, predict, and prevent criminal, terrorist and fraudulent activities.

Tags : cyber security, intelligence, prevention, ibm, data protection, network management, hacker detection, internet security
    
By: Dyn     Published Date: Oct 04, 2016

Distributed Denial of Service (DDoS) attacks increased by over 100% YoY. With nearly a quarter of the attacks aimed at the DNS layer and close to 80% not identified until they reach the DNS layer, it is no secret you should evaluate your Manage DNS provider critically as your first line defense in DDoS mitigation. Download this eBook to best equip your business against impending DDoS attacks including: • Common types of DDoS attacks and which layers of your infrastructure are most at risk • How to geographically isolate attacks and mitigate latency • How to get the best before, during and after attack protection

Tags : ddos, dns, cdn, attacks, internet security, ipsec
    
By: Oracle     Published Date: Sep 06, 2016

Manufacturing faces many challenges in the 21st century with an explosion of new technologies, increasing regulations and ever-rising customer expectations. It’s time to re-imagine manufacturing.

Tags : oracle scm cloud, cloud computing, cloud, scm, security, security application, application security, compliance
    
By: Oracle     Published Date: Sep 06, 2016

Learn why our world-leading, unified solution is relied on by market-leading companies across the planet.

Tags : supply chain, supply chain management, oracle, security, security application, cloud computing, unified solution, risk
    
By: NAVEX Global     Published Date: Aug 18, 2016

This Cyber Security Awareness Kit illustrates how to make your organisation more secure by neutralizing the leading cause of cyber security risk: your employees.

Tags : cyber attack, risk, cyber security, cyber criminals, cyber risks, security, security application, cyber security awareness kit
    
By: Kaspersky     Published Date: Aug 17, 2016

Download our eBook to learn what you can expect from the oncoming wave of connected “things.”

Tags : kaspersky, iot, internet security, hackers, cybercrime, wireless security, network security, firewalls
    
By: Cisco     Published Date: Jun 16, 2016

Attackers are commandeering legitimate infrastructure and reaping millions in profit. Defenders are struggling to detect and combat threats, and confidence is falling.

Tags : security, application security, access control, security policies, anti spyware, email security, internet security
    
By: Cisco     Published Date: Jun 16, 2016

Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.

Tags : security, technology, security tactics, data, application security, internet security, network security appliance, best practices
    
By: Cisco     Published Date: Jun 16, 2016

As much as the Digital Economy and the Internet of Everything (IoE) create opportunities for companies and consumers - over $19 trillion in value to organizations over the next decade - they also create opportunities for hackers and cybercriminals. With an expanded attack surface represented by the IoE, cybercriminals look to cash in on the estimated value of $450 billion to over $1 trillion of the Hacker Economy.

Tags : security, technology, digital, cyber attack, data, access control, anti spyware, application security
    
By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016

This white paper explains the benefits of using Kaspersky Security for Virtualization and its Light Agent technology.

Tags : security application, virtualisation, security, kaspersky, security solutions, application security, internet security, security management
    
By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016

Download this paper now to learn how you can prevent such an attack and protect your business

Tags : prevent cyber-attacks, cyber-attacks, security application, security, anti spam, anti spyware, anti virus, application security
    
By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016

The volume and complexity of cyber-attacks targeting large enterprises and infrastructure service providers is escalating.

Tags : security application, data centers, data, cyber-attacks, security, prevent cyber-attacks, anti spam, anti spyware
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End