data threats

Results 1 - 25 of 252Sort Results By: Published Date | Title | Company Name
By: Adobe     Published Date: Mar 05, 2018
We are fully entrenched in the digital age, so much so that you're probably reading this with a smartphone or mobile device within arms length. Similarly government is also making the shift towards a digital future. But with moving away from paper-based records and towards digital data, there are new opportunities for potential security risks regarding government data and content. As cyberthreats continue to grow in number and sophistication, agencies should be looking at features to secure every level of their digital infrastructure and content. Check out this new pocket guide to learn content security best practices, why it matters, government rules and regulations related to digital data and its associated security and content challenges. You’ll also learn tips and tricks to apply at your agency to make sure your content is secure.
Tags : 
     Adobe
By: Akamai Technologies     Published Date: Aug 11, 2017
DNS is a well-worn data exfiltration and communication vector. Explore why targeted threats continue to use the DNS protocol to exfiltrate sensitive information, how it’s done, and what might be next in the evolution of this attack vector.
Tags : domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
     Akamai Technologies
By: Akamai Technologies     Published Date: Aug 11, 2017
Examine the business impact of malware, ransomware, and phishing, as well as the cost of the average data breach. Given the significant economic impact of these threats, understanding your financial exposure and employing a layered defense simply makes sense.
Tags : domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
     Akamai Technologies
By: Akamai Technologies     Published Date: Sep 10, 2019
Contemporary internet threats are sophisticated and adaptable, they continuously change their complexion to evade security defenses. Traditional rigid, deterministic, rule-based security research are becoming less effective. Security research approaches employing data science methods to implement anomalies-based analysis across very large volumes of anonymized data are now essential. This paper will: • Briefly cover security research challenges in today’s threat landscape • Explain why DNS resolution data is a rich resource for security research • Describe how Akamai teams use DNS data and data science to create better threat intelligence • Discuss improvements in threat coverage, accuracy, and responsiveness to today’s agile threats
Tags : 
     Akamai Technologies
By: Alert Logic     Published Date: Aug 25, 2014
The Security Operations Center (SOC) is where security data is transformed into an effective response to attacks. From investigating threats and scanning for vulnerabilities, to reverse-engineering malware and developing new security content to identify the latest threats, the SOC is a critical piece of the security puzzle. Learn how Alert Logic’s SOC operates to protect IT infrastructure from on-premises data centers to the cloud.
Tags : 
     Alert Logic
By: AlienVault     Published Date: Oct 21, 2014
When dealing with ransomware threats like CryptoWall, which encrypt your data and demand payment to unlock it, spotting infections quickly is critical in order to limit the damage. AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the command and control server. Watch this demo on-demand to see how AlienVault USM detects these threats quickly, saving you valuable clean-up time and limiting the damage from the attack.
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
     AlienVault
By: AlienVault     Published Date: Oct 21, 2014
In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can: • Detect threats (known and emerging) • Identify vulnerabilities • Accelerate incident response • Identify policy violations • Simplify compliance management Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
     AlienVault
By: AlienVault     Published Date: Mar 30, 2016
Given that Point of Sale (POS) systems are used to transmit debit and credit card information in retail transactions, it's no wonder they are a desirable target for attackers. In this white paper, you'll learn about some of the common types of POS malware, how they work and best practices for protecting cardholder data. Topics covered in this white paper include: • Common types of POS malware and how they work • How attackers exfiltrate data from POS systems once they gain access • POS security techniques to protect payment card data Download your copy today to learn how to effectively detect and respond to POS malware threats.
Tags : 
     AlienVault
By: AlienVault     Published Date: Mar 30, 2016
The public demands accountability for data breaches involving systems that include personally identifiable information (PII) and expects that all educational institutions will have the same levels of security that Fortune 500 companies do. However, most educational institutions have fewer IT security resources than their larger enterprise counterparts, yet they face the same threats from attackers. Fortunately, there are solutions. This whitepaper by SANS instructor Jake Williams walks through an example of a typical breach in an education organization, highlighting common ways attackers gain access to a network and practical steps to reduce risk. Download this whitepaper to learn: • Common security gaps that make educational institutions vulnerable to attack • Practical security controls that won't break the bank • Key questions to evaluate security vendors • A checklist summarizing steps you should take now to improve security
Tags : 
     AlienVault
By: Arbor Networks     Published Date: Sep 29, 2012
This newsletter is intended to educate and inform enterprise network and data center operators about the problem of distributed denial of service (DDoS).
Tags : ddos, distributed denial of service, data center, malware, security threats, database servers, dns
     Arbor Networks
By: Arbor Networks     Published Date: Sep 29, 2012
Botnets and DDoS attacks are perceived as being malevolent and unstoppable. Fortunately there are companies like Arbor Networks, who are dedicated to analyzing and stopping botnets and DDoS attacks on a global basis.
Tags : ddos attacks, distribution denial of service, botnet, network infrastructure, database security, data center, security threats
     Arbor Networks
By: Arbor Networks     Published Date: Mar 06, 2013
This Frost & Sullivan white paper identifies what organizations need to know to protect their intellectual property and prepare for unexpected data breaches. Cyber threats continue to mutate and grow in volume. Read on to learn more.
Tags : defeating cyber threats, wider net, arbor networks, network security, improving ability to protect data, data security, security, data management, data center
     Arbor Networks
By: ArborNetworks     Published Date: Feb 12, 2016
Ask any cybersecurity professional and she’ll tell you that her job is getting increasingly difficult. Why? Most will point to a combination of the dangerous threat landscape, IT complexity, and their overwhelming workload. These issues are driving a major transition in enterprise security. Large organizations must move beyond a threat prevention mentality to become proactive cyber-¬-attack “hunters” that constantly monitor their networks for signs of trouble. This shift to proactive hunting will require new technologies that collect, process, and analyze massive amounts of security data, offer intelligent security analytics for real-¬-time incident detection, integrate threat intelligence to align suspicious internal activities with external threats, and provide analysts with the right data analytics features to query and manipulate data for historical investigations.
Tags : arbor networks, enterprise, cyber attack, network, data, security
     ArborNetworks
By: AWS     Published Date: Oct 30, 2018
How Snapper Further Protects Data in Amazon S3 Using CWP for Storage Abstract: Snapper, a New Zealand-based company that develops custom account-based solutions, was creating an online concessions payment program for local students and needed a way to enhance the security of their personal information on Amazon Web Services (AWS). The solution had to further protect online student profiles and associated payment details stored in Amazon Simple Storage Service (Amazon S3) against malware and threats. Snapper chose Symantec Cloud Workload Protection for Storage (CWP for Storage) for its advanced malware protection, elastic scalability, and simple deployment requiring only a few hours.
Tags : snapper, data, amazon, cwp, storage
     AWS
By: AWS - ROI DNA     Published Date: Nov 19, 2018
"Organizations are increasingly moving their mission-critical applications and data to Amazon Web Services (AWS) and taking advantage of the massive compute power of Amazon Elastic Compute Cloud (Amazon EC2). The CrowdStrike Falcon® platform for AWS provides extensive and detailed visibility over Amazon EC2 instances, helping to improve an organization’s overall security posture. Learn how CrowdStrike® Falcon Discover™ enables IT security professionals to quickly identify and stop threats. Download this solution brief to learn how you can help satisfy your security requirements by: • Monitoring and searching metadata to improve security posture • Reviewing the rate of the Amazon EC2 instances launched over time • Gaining additional context surrounding alerts"
Tags : 
     AWS - ROI DNA
By: Bit9     Published Date: Mar 07, 2013
In this whitepaper, Industry Analyst Frost and Sullivan examines today’s advanced threat landscape and recommends that organizations adopt a new approach to server security that is based on trust.
Tags : data breaches, data center, security, cyber threats, server, business continuity
     Bit9
By: Black Lotus     Published Date: Apr 21, 2014
Newly updated for April 2014 with Q1 attack data, download the latest DDoS Threat Advisory from Black Lotus to learn about the latest threats facing your company.
Tags : black lotus, black lotus communications, ddos, denial of service, security threat, hackers, spam, fishing, firewall, intrusion, mobile secuirty
     Black Lotus
By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : cyber attacks, cia, nsa, wannacry, notpetya
     BlackBerry Cylance
By: Blue Coat     Published Date: Nov 23, 2015
It’s time for Proactive Incident Response: *Full logs in the SIEM, plus complete collection of packet data *Packet data indexed, easily searchable and correlated with threat intelligence and other data. Working with multiple sources of security data, threats are detected early.
Tags : 
     Blue Coat
By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, networking, data center
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : mobile, malware, security, scams, bluecoat, data loss
     Blue Coat Systems
By: Butler Technologies     Published Date: Jul 02, 2018
The Tenth Annual State of the Network Global Study focuses a lens on the network team’s role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60 percent and software-defined networking (SDN) is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. With growth comes change and some trends identified in this year’s survey include a rise in email and browser-based malware attacks (63 percent) and an increase in sophistication (52 percent). Nearly 1 in 3 also report a surge in DDoS attacks, signaling a ne
Tags : 
     Butler Technologies
By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organization’s infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
     CA Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com