cyber attacks

Results 101 - 125 of 409Sort Results By: Published Date | Title | Company Name
By: GE Power     Published Date: Jan 27, 2017
Donít wait to implement your cyber protection program. An excellent place to begin developing your approach is with the newly published The U.S. Homeland Security Strategies for Defending Industrial Control Systems. See the 7 recommended strategies and learn and how digital solutions can help fulfill steps toward a more secure operating environment.
Tags : cyber security, power plants, utilities, power producers, power plant, cyber attacks, power grids, power industry, power plant software, us homeland security, cyber security strategy, powerplant security, powerplants, cyber security assessment
     GE Power
By: GE Power     Published Date: Jan 31, 2017
Donít wait to implement your cyber protection program. An excellent place to begin developing your approach is with the newly published The U.S. Homeland Security Strategies for Defending Industrial Control Systems. See the 7 recommended strategies and learn and how digital solutions can help fulfill steps toward a more secure operating environment.
Tags : cyber security power plants, utilities, power producers, power plant cyber attacks, power grids, power industry, power plant software, us homeland security, cyber security strategy, powerplant security, powerplants, cyber security assessment
     GE Power
By: FireEye     Published Date: Sep 11, 2012
Cyber Attacks on Government: How to Stop the APT Attacks that are Compromising Federal Agencies.
Tags : cyber attacks, apt attacks, federal, compromising, security
     FireEye
By: Mimecast     Published Date: Apr 10, 2019
Email. Itís the number-one business application used by organizations. Itís also the number-one method used to execute cyberattacks, enabling malware delivery, phishing, impersonations, and the spread of threats that are already internal to your organization. In fact, 91 percent of all cyberattacks start with an email. And your organization canít function for long without email. How many hours of email downtime can your organization comfortably live with? If email isnít accessible due to an adverse incident like malicious intent, human error or technical failure, your organization would likely suffer. The only way to get ahead of cybercriminals and to holistically protect your business is to adopt a new approach to email security. You need a multidimensional approach that brings together threat protection, adaptability, durability and recoverability in a single cloud-based service. You need to enable these four dimensions to truly provide cyber resilience for your email.
Tags : 
     Mimecast
By: Mimecast     Published Date: Nov 14, 2018
Are your employees behaving badly? Quick Fact: Only 11% of organizations continuously train employees on how to spot cyberattacks. Too often time, resources and conflicting priorities push training to the bottom of the list. Check out the latest insights from the Cyber Resilience Think Tank to learn how to make security awareness a key facet of your organizationís culture. The consequences of not prioritizing security awareness training are real. Read about it.
Tags : 
     Mimecast
By: Cisco     Published Date: Feb 17, 2015
Analyst brief brought to you by NSS Labs. Where the goal of cyberprevention has been to reduce the probability of an attack against the organization, cyber resilience looks to reduce the impact of these attacks through cyber risk management. A cyber resilience program still considers detection and prevention techniques, but it also assumes that a breach is likely. This stance emphasizes anticipation, agility, and adaptation. Not every attack can be prevented, but with a cyber resilience program, damage can be mitigated or avoided altogether.
Tags : cisco, nss, cyber, prevention, risk management, resilience, firewall, security, protection, epp, breach, cyberattack, operations, network
     Cisco
By: Delta Risk     Published Date: Sep 21, 2016
Nowhere else could that wise advice be more relevant than in contemplating the effects of cyber attacks on financial institutions. As stated in a recent issue of the FDICís Supervisory Insights, the risks presented by cyber attacks have become ďone of the most critical challenges [in the last decade] facing the financial services sector due to the frequency and increasing sophistication of cyber attacks.Ē In just a yearís time, from 2014 to 2015, the occurrence of security incidents increased 38 percent as reported in a survey of 10,000 security, IT, and executive personnel. Just as concerning, the attackers perpetrating these breaches were able to compromise the victim organization within a matter of minutes in 60 percent of cases.
Tags : cyber threats, security breaches, malware and vulnerabilities, internet security, security
     Delta Risk
By: EMC Corporation     Published Date: Oct 01, 2014
Find out by watching the RSA Security Analytics and RSA ECAT on-demand video.
Tags : cyber attacks, virtual, security, analytics, ecat
     EMC Corporation
By: ForeScout     Published Date: Feb 18, 2014
Know your enemy! Establishing an effective defensive strategy is crucial with today's rapidly evolving cyberthreats. Understanding the cybercriminals' techniques used to perpetrate successful attacks is essential. The Cyberthreat Defense Report is based on a rigorous survey of IT security decision makers and practitioners across North America and Europe. It reveals the current and planned deployment of technological countermeasures. Read this new report from CyberEdge and stay one step ahead of your enemy.
Tags : forescout, cyberedge, cyberthreat, it security, security, it management
     ForeScout
By: Palo Alto Networks     Published Date: Apr 25, 2017
Cyber criminals constantly innovate their threat tactics to more efficiently breach organizations and make off with valuable data. As cybercrime evolves, we see increased innovation in the hacking tools and techniques used to evade known security mechanisms. In the past few years, we have seen more advanced, targeted attacks, where hackers spent ample time investigating the target and tailoring the threat. Keeping up with new attack techniques, and effectively defending against advanced threats, is perhaps the biggest challenge facing security teams today. In a world of cyberthreats where the only constant is change, architecting a cybersecurity solution that dynamically adapts to constant change is crucial.
Tags : 
     Palo Alto Networks
By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
MIT Technology Review Survey: Executive Summary Are you prepared for the next breach? Only 6% of leaders say yes. Information securityóor, the lack of itóis firmly on the radar for business and IT leaders in organizations of all sizes and in every sector. Many fear that their companies are ill-prepared to prevent, detect, and effectively respond to various types of cyberattacks, and a shortage of in-house security expertise remains of widespread concern. Those are among the initial findings of the Cybersecurity Challenges, Risks, Trends, and Impacts Survey, conducted by MIT Technology Review of approx. 225 business and IT executives, in partnership with Hewlett Packard Enterprise Security Services and FireEye Inc.
Tags : 
     Hewlett Packard  Enterprise
By: Vectra Networks     Published Date: Aug 03, 2015
Learn how Vectra protects Tri-Stateís corporate and subscriber data and prevents cyberattacks to the power grid.
Tags : utilities provider, cyberattack detection, vulnerability management, security management, it security, security solution, network breaches, false threats, real-time insights, critical infrastructure, ids, ips
     Vectra Networks
By: Cisco     Published Date: Jan 17, 2018
As the region is poised to take its position amongst the worldís top digital economies, the doors are wide open for cyberattacks. A radical agenda can help policy makers and industry leaders defend and capture a wealth of value.
Tags : 
     Cisco
By: Delta Risk     Published Date: Jun 07, 2016
Nowhere else could that wise advice be more relevant than in contemplating the effects of cyber attacks on financial institutions. As stated in a recent issue of the FDICís Supervisory Insights, the risks presented by cyber attacks have become ďone of the most critical challenges [in the last decade] facing the financial services sector due to the frequency and increasing sophistication of cyber attacks.Ē In just a yearís time, from 2014 to 2015, the occurrence of security incidents increased 38 percent as reported in a survey of 10,000 security, IT, and executive personnel. Just as concerning, the attackers perpetrating these breaches were able to compromise the victim organization within a matter of minutes in 60 percent of cases.
Tags : cyber threats, security breaches, malware and vulnerabilities, internet security, security
     Delta Risk
By: Kaspersky     Published Date: Feb 05, 2015
This White Paper provides information on how to ensure protection from both regular malware and sophisticated targeted attacks.
Tags : cyberthreats to ics systems, protect from malware, protect from targeted attacks, ics, it security, ensure ics security, protection measures
     Kaspersky
By: Tripwire     Published Date: Feb 08, 2013
Cyberwar fundamentally changes how government must handle security. Firewalls, intrusion detection systems and other security devices can stop the average hacker, but new threats use stealth techniques that these defenses cannot detect on their own.
Tags : cyberwar, hacker detection, defense, security, government, firewall, cyber attacks, cyber threats, intrustion detection, intrusion defense
     Tripwire
By: CyberX     Published Date: Feb 03, 2017
Arm yourself against the powerful cyberweapons and methods cyberattackers are using to compromise electrical grids, manufacturing, oil and gas, pharmaceuticals, and other critical infrastructure industries.
Tags : cyberx, ics hacking, hacking, cyberweapons, cyberattacks, production operations, ics, scada, security
     CyberX
By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customersí personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : cyber attacks, cia, nsa, wannacry, notpetya
     BlackBerry Cylance
By: Darktrace     Published Date: Apr 02, 2019
The current era in cyber security is characterized by three fundamental challenges: the complexity of the enterprise network and connected infrastructure, the speed of newage attacks, and the strain of overwhelmed incident responders. In many ways, the expansion of networks and continual adoption of new technologies - from cloud services to the Internet of Things - has expanded the attack surface and introduced new entry-points through which attackers can gain a foothold. This, combined with the ready availability of exploit kits on the Dark Web, has led to the Ďvicious circle of the SOCí, where incident responders are so busy fire-fighting that they rarely have time to implement the critical patches that would prevent the problem at source. As security teams struggle to keep up with the rising volume of routine attacks, a new generation of cyberthreat has also emerged, characterized in large part by fast-moving threats that make an impact well before humans have time to respond. Thes
Tags : 
     Darktrace
By: Oracle     Published Date: Jun 20, 2016
The number one technology issue in the C-suite today is cyber-security. And thereís no wonderóattacks are becoming more numerous and more sophisticated than ever. The cost of cyber-crime to the global economy has topped more than $445 billion2 Ė equivalent to 1% of global GDP. Sometimes cyber-crime can seem unstoppable Ė while firms spent more than $75 billion on cyber-defences in 20153 , cyber-crime grew by 38% that year. Thatís why C-suite executives everywhere are asking: What can we do to make a difference in defending against hackers, cyber-criminals and digital spies?
Tags : 
     Oracle
By: Cox Business     Published Date: May 31, 2017
For cybersecurity professionals, 2016 presented a year of distributed denial of service (DDoS) attacks that were unprecedented. Week after week, the public was inundated with news of hacks, attacks, and data leaks. It didnít take long for everybody to realize the old axiom of cybersecurity still holds true - there are two types of companies: those who are hacked and know about it, and those who are hacked and soon will find out. As a key player in the war against DDoS attacks, Neustar has been on the front line, detecting, alerting, and mitigating strikes to keep companies and their customers safe.
Tags : 
     Cox Business
By: Kaspersky     Published Date: Aug 27, 2015
Download Debunking the Top 5 Security Implementation Myths to learn why staying with your current, inferior technology costs your business more money in the long run.
Tags : kaspersky, attacks, cyberattacks, business process, security costs, it budget
     Kaspersky
By: Infoblox     Published Date: Sep 04, 2013
Press headlines are filled by reports of malware attacks. Malware attacks, once the reserve of amateurs largely for amusement, are now launched by a number of entities. Today, a malware attack can literally come from anywhere in the world and can impact even the largest organization.
Tags : infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
     Infoblox
By: EMC Corporation     Published Date: Oct 01, 2014
RSA Security Analytics and RSA ECAT give security teams an edge in the hunt for cyber attacks.
Tags : cyber attacks, live, virtual, security, analytics, ecat
     EMC Corporation
By: FireEye     Published Date: Feb 12, 2013
Winning the War Against the New Breed of Cyber Attacks.
Tags : fireeye, threat protection, next-generation, next-generation threat protection, cyber attacks
     FireEye
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com