dam

Results 651 - 675 of 884Sort Results By: Published Date | Title | Company Name
By: BlackBerry Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today’s cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : ransomware, threats, cyber, security, data
     BlackBerry Cylance
By: OKTA     Published Date: Mar 30, 2018
"The enterprise cloud revolution is here. IT organizations everywhere, from small and mid-sized to Fortune 500 companies, are moving from on-premises software to on-demand, cloud-based services. As enterprise IT makes this transition to a new hybrid on-demand/on-premises configuration, controlling access to applications becomes increasingly important. CIOs and their teams have a whole new set of identity management challenges; their role is also fundamentally changing. As the steward of these new services, IT must provide insight and advice about Software-as-a-Service (SaaS) products to ensure the company gets the highest business value of their investments. Read this eBook to learn eight main identity and access management (IAM) challenges of adopting and deploying cloud applications. And, most importantly, best practices for addressing each of them."
Tags : 
     OKTA
By: Lumension     Published Date: Feb 04, 2011
With cyberattacks inflicting increasingly greater damage following uncontrolled connection, it's time that government organizations got serious about outside threats.
Tags : usb security, network security, patch management, lumension, device management, security
     Lumension
By: SAS     Published Date: Mar 06, 2018
The 2016 ACFE Report to the Nations on Occupational Fraud and Abuse analyzed 2,410 occupational fraud cases that caused a total loss of more than $6.3 billion.8 Victim organizations that lacked anti-fraud controls suffered double the amount of median losses. SAS’ unique, hybrid approach to insider threat deterrence – which combines traditional detection methods and investigative methodologies with behavioral analysis – enables complete, continuous monitoring. As a result, government agencies and companies can take pre-emptive action before damaging incidents occur. Equally important, SAS solutions are powerful yet simple to use, reducing the need to hire a cadre of high-end data modelers and analytics specialists. Automation of data integration and analytics processing makes it easy to deploy into daily operations.
Tags : 
     SAS
By: SAS     Published Date: Apr 04, 2018
Opioid use grabs headlines when important celebrities overdose. Prince is sadly the most recent. But the problem is persistent and pervasive. The marginally good news is that the number of opioid prescriptions written started to decline last year. Overdose deaths, however, continued to rise. Also in the news have been lawsuits against pharmaceutical companies and distributors for helping to create the astounding oversupply of opioids, but the root causes go deeper. Physicians and their patients, medical policy makers and licensing boards, pharma companies and pharmacies all have played roles. And all must work together to stem the opioid epidemic and achieve the fundamental objectives of reducing addiction and deaths.
Tags : 
     SAS
By: Rocket Fuel     Published Date: Jan 28, 2013
This whitepaper explains the fundamentals of programmatic buying, and what it can do to propel your digital marketing. It also explains the key concepts you must understand in order to access the huge profit potential of programmatic buying.
Tags : media buying, programmatic buying, real time bidding
     Rocket Fuel
By: Qualys     Published Date: Jan 11, 2017
In this age of supply chain interconnectedness, a large organization may have hundreds of third parties with access to its physical premises, IT networks and data. Your organization may have a secure IT infrastructure, but third parties can make it vulnerable to breaches, which often result in corporate data theft, brand damage and hefty government fines.
Tags : information security, it compliance, it audit, it security, network security, web application security, application security
     Qualys
By: Intermec     Published Date: Aug 01, 2008
Find out how each aspect of perfect order performance (On-Time Delivery, Complete Orders, Damage-free Delivery, Accurate Invoicing and Documentation) can be improved through enhancements to data collection processes and technologies including RFID, speech, imaging technology, and GPS.
Tags : rfid, on-time delivery, complete orders, perfect order, bar code, manufacturing, metrics, speech
     Intermec
By: GoToAssist     Published Date: Oct 05, 2011
This new TSIA white paper explores 3 fundamental metrics - operational, quality and cost - that you should include in your services dashboard, outlines specific measurements to track in each area and provides industry averages for key metrics to help with benchmarking.
Tags : citrix, technology, metric, tsia, operations, quality, cost, dashboard
     GoToAssist
By: EMA     Published Date: Aug 22, 2012
Join EMA Research Director, Charles Betz, and Blazent Senior Director of Sales Engineering, Adam Clark, to learn how Blazent is pioneering a new approach to master data management that can greatly improve the business results from IT.
Tags : it infrastructure, data management, backup and recovery, data strategy, data quality, blazent, improving business results
     EMA
By: IBM     Published Date: Apr 23, 2013
Now is the time for the finance organization to step up to the challenges and become a strategic business partner in the deployment of profitability analysis across the enterprise. This requires a fundamental shift—in terms of both vision and execution. Tomorrow’s winners will be the ones that are not content simply to survive this economic onslaught, but work to emerge nimble enough to thrive. Profitability analysis is critical in this context. Read this whitepaper to learn more about profitability analysis and its benefits.
Tags : profitability, analysis, finance, projection, prediction, analytics, automation, metrics
     IBM
By: Impact Recovery Systems     Published Date: Oct 17, 2012
Solving problems related to vehicle collisions with fixed bollards while maintaining the function of access denial bollards.
Tags : 
     Impact Recovery Systems
By: MEDIAPLEX     Published Date: Dec 05, 2012
This guide is designed to help major brand marketers gain an understanding of the fundamentals of genuine cross channel marketing attribution.
Tags : analytics, attribution, data, big data, marketing data, marketing intelligence
     MEDIAPLEX
By: Vocus     Published Date: Mar 13, 2013
Content marketing attracts customers, builds trust and makes you visible - and the cost starts at zero.
Tags : vocus, content marketing, creating effective content, joe chernov, scott stratten, ann handley, adam singer
     Vocus
By: RingCentral     Published Date: Dec 05, 2013
Businesses of all sizes have a fundamental reliance on their communications infrastructure. This guide is designed to help you with the considerations you should be taking when looking to implement a new communications solution.
Tags : phone system, ringcentral, ring central, communications, business communications, wireless, business phones, wireless phones
     RingCentral
By: IBM     Published Date: Apr 29, 2014
With a wealth of information readily available online, consumers are now better able to compare products, services and prices—even as they shop in physical stores. When consumers interact with retailers publicly through social media, they have greater power to influence other customers or damage a brand. These and other changes in the retail industry are creating important opportunities for retailers. But to capitalize on those opportunities, retailers need ways to collect, manage and analyze a tremendous volume, variety and velocity of data.
Tags : ibm, retail, ecommerce, big data, retail technology, social media, data analytics, customer insights
     IBM
By: Corporate Visions     Published Date: Apr 03, 2014
Are your team’s seemingly small discount concessions doing major hidden damage to your profit margins? Read our FREE eBook to find out the five negotiating mistakes that may be costing you BIG money!
Tags : corporate visions, marketing, sales, sales myths, marketing myths, powerpoint, sales techiniques
     Corporate Visions
By: Adobe     Published Date: Apr 03, 2015
A lack of executive support and poor data quality are just some reasons why analytics programs fail. The guide by Adam Greco, Reenergize Your Web Analytics, identifies the key reasons for program failures and provides ten ways to make your analytics program successful. Read the guide to discover key ways to improve your analytics program, including: • How to deal with your stakeholders • How to set your analytics priorities • How to reap the rewards of change
Tags : analytics program, stakeholders, adobe, marketing, personalization
     Adobe
By: Polycom     Published Date: Feb 25, 2015
The workplace is undergoing fundamental changes, with people persistently connected by digital collaboration technologies and an evolving work environment. Understanding these key trends will enable enterprises to prepare for and implement a collaborative workplace.
Tags : polycom, collaboration, connectivity, communication, deployment, video conferencing, infrastructure, user experience
     Polycom
By: ForgeRock     Published Date: Oct 24, 2014
Identity is a fundamental requirement to digital growth. Businesses and organizations cannot properly take advantage of mobile, cloud, or Internet of Things (IoT) technologies without a scalable and repeatable identity strategy. Without it, they have no way to identify and engage with their customers in a meaningful way — whether it be through a laptop, mobile phone, tablet, connected car, healthcare wearable, connected home device or the next great connected innovation. This guide is designed to help you understand the essentials of customer-focused identity and how it helps you engage with your customers.
Tags : revenue generator, digital growth, identity management, customer-focused, it management, enterprise applications
     ForgeRock
By: ForgeRock     Published Date: Mar 10, 2015
Identity is a fundamental requirement to digital growth. Businesses and organizations cannot properly take advantage of mobile, cloud, or Internet of Things (IoT) technologies without a scalable and epeatable identity strategy. Without it, they have no way to identify and engage with their customers in a meaningful way — whether it be through a laptop, mobile phone, tablet, connected car, healthcare wearable, connected home device or the next great connected innovation. This guide is designed to help you understand the essentials of customer-focused identity and how it helps you engage with your customers.
Tags : irm, management, time-to-market, forgerock, revenue generator, software development
     ForgeRock
By: MineralTree     Published Date: Jan 14, 2015
Yes, your company is a ripe target for fraud - but it doesn't have to be. Cybercriminals love small to medium businesses, since they have more money in their bank accounts than individuals, but often lack the sophisticated technology and vigilant processes of larger organizations. Gartner estimates that more than 10 percent of small businesses have had funds stolen from their bank accounts.
Tags : mineraltree, online fraud, business, damage, technology, bank, accounts, theft
     MineralTree
By: Revel Systems     Published Date: Jul 22, 2015
Hacking is a fact for life. Some hack for fame, some for sport, others for profit. In 2013 a group of hackers created and sold tens of thousands of dollars in gift cards after hacking Subway's point of sale. The 2013 "Holiday Hackers" have stolen data from 110 million innocent consumers and counting, damaging the reputation and bottom line of major retailers such as Target and Neiman Marcus, as well as credit card providers like JPMorgan.
Tags : point of sale, security for your retail shop, ipad pos, pos security
     Revel Systems
By: Microsoft Office 365     Published Date: Sep 08, 2016
Data breaches are more than a security problem. A significant attack can shake your customer base, partner relations, executive staff, profits, and revenue. Historic data breaches have cost executives their jobs, resulted in major revenue losses and damaged brand reputations.
Tags : 
     Microsoft Office 365
By: Code42     Published Date: Feb 28, 2018
Disaster Recovery Plan Roadmap Learn how automatic backup delivers guaranteed business data protection and recovery—no matter the threat. When ransomware hits, the average small business experiences two full days of downtime. One-third of businesses lose revenue and all experience brand and loyalty damage that’s harder to quantify. To stop the bleeding, most small businesses end up paying at least $2,500 to get their data back. But paying the ransom doesn’t guarantee anything. Plenty of businesses have fully complied with the ransom demands, only to have the ransomer increase the ransom request—or simply take off with the ransom and the data.
Tags : 
     Code42
Start   Previous    20 21 22 23 24 25 26 27 28 29 30 31 32 33 34    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com