leak

Results 1 - 25 of 100Sort Results By: Published Date | Title | Company Name
By: (ISC)²     Published Date: Oct 15, 2010
A four-step approach to establishing leading data protection practices.
Tags : isc2, data leak, protection planning, data protection, cloud computing, security, employee
     (ISC)²
By: AlienVault     Published Date: Oct 21, 2014
Two of the oldest and most common attacks used against web applications, SQL injection attacks and cross-site scripting attacks (XSS), continue to impact thousands of websites and millions of users each year. Finding these exposures quickly is essential in order to prevent system compromise and avoid information leakage. SIEM solutions can be invaluable in this effort by collecting and correlating the data you need to identify patterns that signal an attack.
Tags : alienvault, sql injection, web security, cyber attacks, siem solutions, xss, cross site scripting attacks, siem
     AlienVault
By: ALL ICT Ltd     Published Date: Mar 26, 2008
The aim of this document is to assist organizations protecting their assets – tangible and intangible – through a Security Management Program. This program provides a holistic, hands-on, and consistent approach for securing the organization against serious security breaches, such as data leakage, while providing the organization with the required flexibility to adapt itself to the business needs and to remain competitive in the market.
Tags : allict, all ict, security management, security
     ALL ICT Ltd
By: AppZen     Published Date: Jul 17, 2019
Learn how Intuit’s CFO Melanie Gallagher used the findings from AppZen to save hundreds of thousands of dollars in T&E leakage. She went step further to join force with managers and Human Resources across the organization to create standardized policies relating to expense report conduct.
Tags : 
     AppZen
By: AppZen     Published Date: Oct 21, 2019
Modern finance teams are adopting AI to automate processes and enable complex decision making across a broad swath of their operations. AI-powered spend auditing is especially promising because expenses and payables are rife with spend leakage, non-compliance, and inefficiencies. Download this whitepaper to learn how to evaluate potential AI-powered spend auditing solutions.
Tags : 
     AppZen
By: Apstra     Published Date: Aug 19, 2019
You may have read in the news about horrific security gaps that have the potential of bringing down whole infrastructures, leaking critical business and personal data, and exposing organizations to massive liability. There is no question that improving organizations’ security posture is a critical requirement for infrastructure and security teams.
Tags : 
     Apstra
By: Asure Software     Published Date: Nov 06, 2013
This paper will offer you clear insight into ways of determining how much money your organization is losing through inefficient payroll processes. More importantly, it will provide you with clear, simple directions for correcting the problem immediately with little risk to the organization’s cash flow.
Tags : payroll, manage costs, payroll processes, time and labor management, workforce management software, workforce management, workforce management solutions
     Asure Software
By: Athena Security     Published Date: Jan 28, 2010
SIEM solutions detect real attacks from the thousands of events that are happening in the network. When an unexpected and potentially dangerous event is recognized, engineers take a quick (temporary) action to block the security leak, diagnose what really went wrong, determine what else is at risk, and decide on a fix.
Tags : firewalls, security, sim, siem, network security, risk, firewall analytics, security incident
     Athena Security
By: BAE Systems     Published Date: Dec 29, 2015
Find an approach that stops dangerous email leaks, keeps things simple, and lets you go about your business with minimal disruption
Tags : bae systems, applied intelligence, email, insider threat prevention, data breach, data loss, intellectual property, byod
     BAE Systems
By: BlackBerry     Published Date: Mar 11, 2013
See how BlackBerry® 10 guards against data leakage, prevents unauthorized access, secures corporate apps on personal devices and more – with advanced policies tough enough for the world’s most security-conscious organizations.
Tags : capabilities of blackberry 10, apps, secure corporate apps, corporate, devices, personal devices, organizations, enterprise applications
     BlackBerry
By: Blackberry     Published Date: Jul 12, 2019
Law firms have received two dramatic wake-up calls about the vital importance of data security in the last two years. First, there was the leak of 11.5 million documents from offshore law firm Mossack Fonseca, known as the Panama Papers, which became public in 2016.1 Then came the massive cyberattack on prominent global law firm DLA Piper in the summer of 2017.2 As we will explore, despite the industry’s aversion to media coverage of such attacks, less-visible breaches involving the legal profession are being reported worldwide in ever-increasing numbers.
Tags : 
     Blackberry
By: BlackBerry Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today’s cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : ransomware, threats, cyber, security, data
     BlackBerry Cylance
By: CDW     Published Date: Jul 08, 2015
Data leakage prevention systems get new respect thanks to technical advancements and new implementation best practices.
Tags : dlp, data loss, security, best practices
     CDW
By: CDW     Published Date: Jul 08, 2015
An effective data loss prevention program requires the right technologies and policies in place and working together.
Tags : dlp, leakage, security, strategy
     CDW
By: Citrix ShareFile     Published Date: Apr 19, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: • Avoid costly security missteps, leaks, and hacks. • Protect your firm's reputation while meeting clients' cyber security expectations. • Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : data security, data breach, data encryption, data compliance, accounting, data protection
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Apr 19, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: • Avoid costly security missteps, leaks, and hacks. • Protect your firm's reputation while meeting clients' cyber security expectations. • Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : data security, data breach, data encryption, data compliance, accounting, data protection
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jun 12, 2017
Some of the biggest challenges IT teams face today stem from data loss and security risks arising from the unauthorized use of personal file sharing services by employees for business purposes. Personal file sharing services invite data leakage and compliance violations by allowing files being shared to escape beyond the visibility and control of IT. At the same time, these services meet the essential need of today’s mobile workforce to be able to access and share data wherever people work. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.
Tags : data loss, security, file sharing, mobile workforce
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 11, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: Avoid costly security missteps, leaks, and hacks. Protect your firm's reputation while meeting clients' cyber security expectations. Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : finance, data encryption, cyber security, data efficiency, client expectations
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 11, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: Avoid costly security missteps, leaks, and hacks. Protect your firm's reputation while meeting clients' cyber security expectations. Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : data security, encryption, efficiency, compliance
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Oct 04, 2019
Your employees want easy and quick access to files from any device—but if you don’t provide this flexibility, they will go around you and upload company data to unauthorized cloud services. It’s time to prevent data leakage with a file sharing solution that combines security and convenience. In this white paper, you’ll learn how file sharing goes beyond storage to accelerate your business with: • Flexible access to files from any device and any location • Streamlined security and access control • Choice of private and public cloud storage
Tags : 
     Citrix ShareFile
By: Clearswift     Published Date: Jun 09, 2008
In this white paper Clearswift address the question "Is it possible to build a leak free enterprise?" In addition to a Gartner research note on "Understand Data Leakage" we answer the question by describing 15 of the most common mistakes of web and email security and the associated risks and solutions.
Tags : data protection, clearswift, data management
     Clearswift
By: Concur     Published Date: May 07, 2012
Download our full Benchmark Report 2012 analysis and learn best practices on how your business can ensure money is not leaking away undetected.
Tags : concur, finance, business, travel and expense management, budget
     Concur
By: Corrigo     Published Date: Nov 01, 2019
PropTech is disrupting the facilities management and real estate industries – from big data and IoT to artificial intelligence and augmented reality. The latest advances in PropTech are accelerating change in facilities management like never before, driving bottom line value and helping future-proof FM operations. The promise of PropTech is why our Corrigo team is investing so heavily in frictionless, self-learning platforms to help our clients use technology to truly transform their businesses. But as we amplify FM ops with new technology, we are just as passionate about helping our clients optimize their current processes. Why? Because making even small changes today can mean huge savings for their bottom line. In fact, 80% of organizations are leaking more FM value right now than they could immediately gain with new, emerging tech strategies. That’s no small leak – it’s a staggering loss for organizations of all sizes. After analyzing 700 million facilities management transactions a
Tags : 
     Corrigo
By: Cox Business     Published Date: Dec 19, 2016
As we continue to move forward into an age of big data, optimization, and shared information through the capabilities of better networking technologies, opportunities have never been greater for using technology to improve the way the government interacts with constituents. However, increasing dependence on web and network services also makes government a tempting target for hackers. Distributed Denial of Service attacks, data breaches, leaks, the risks can be enormous. Recent events have shown us that now more than ever, government servers are getting victimized by well-funded teams of foreign hackers, possibly funded by their government.
Tags : 
     Cox Business
By: Cox Business     Published Date: May 31, 2017
For cybersecurity professionals, 2016 presented a year of distributed denial of service (DDoS) attacks that were unprecedented. Week after week, the public was inundated with news of hacks, attacks, and data leaks. It didn’t take long for everybody to realize the old axiom of cybersecurity still holds true - there are two types of companies: those who are hacked and know about it, and those who are hacked and soon will find out. As a key player in the war against DDoS attacks, Neustar has been on the front line, detecting, alerting, and mitigating strikes to keep companies and their customers safe.
Tags : 
     Cox Business
Start   Previous   1 2 3 4    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com