cybersecurity

Results 276 - 300 of 322Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Sep 30, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, security, maturity, c suite, cybersecurity, knowledge management, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
Is it better to build your own internal cybersecurity expertise and security intelligence & analytics platform or should you outsource the responsibilities to a team of experts? Read this paper by Securosis, L.L.C, an independent research and analysis firm, to understand the drivers, use cases and partner selection criteria for managed security monitoring.
Tags : 
ibm, security intelligence services, ibm security intelligence solution, security, managed security monitoring, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: May 08, 2018
Internally developed software applications support the most sensitive and strategically important business processes of most enterprises. Yet application security is one of the most neglected fields of cybersecurity.
Tags : 
application security, software applications, cybersecurity
    
IBM
Published By: IBM     Published Date: Jun 06, 2018
There is one certainty with cybersecurity and that is nothing is certain. Take for example the role the endpoint plays in keeping an enterprise secure. While many cybersecurity professionals are relatively certain that endpoints are locked down and security policies are being enforced, the simple fact of the matter is that endpoints prove to be the root of most compromises. Research
Tags : 
    
IBM
Published By: IBM     Published Date: Jun 06, 2018
System vulnerabilities, ransomware, malware, intrusions, and other malicious activities are on the rise, showing that today’s cybersecurity professionals are hard-pressed to keep enterprises secure. Although threats are growing in sophistication and attack vectors are expanding, many of the intrusions and cyber attacks happening today are simply a result of improper protections being put in place, systems going unpatched, or weak security policies. While much of the blame is being placed on cybersecurity professionals, the real blame should often be placed upon the tools and policies that many of those professionals have come to trust and the complexity that comes with them.
Tags : 
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
Security incidents have been on the rise for the past few years, and most experts in cybersecurity believe the trend will only continue to intensify. Here, though, our subject is not the high-profile, headline-grabbing attacks we all know about but the everyday struggle of organizations everywhere, in every industry, to protect their data in a world of thieves.
Tags : 
security, cyber crime, trends, cyber security, data protection
    
IBM
Published By: Cisco     Published Date: Nov 17, 2014
Recent changes in hacking combined with the emergence of the Internet of Everything have profoundly changed how we protect our systems, driving us to think about a new approach to cybersecurity. In this paper, learn about the challenges that created the need for a new threat-centric security model spanning the full attack continuum: before, during and after an attack.
Tags : 
spyware, rootkits, hacking, cisco, advanced threat protection, networking, security, enterprise applications
    
Cisco
Published By: IBM     Published Date: May 09, 2013
Federal agencies must take a proactive approach to information and network security due to increasing cybersecurity threats. IBM Tivoli Endpoint Manager, built on BigFix technology, is the leading enterprise cybersecurity solution to help combat cyber threats and eliminate vulnerabilities.
Tags : 
network, security, cybersecurity, endpoint manager, solution, eliminate vulnerabilities, technology
    
IBM
Published By: Kaspersky     Published Date: Jan 07, 2015
Do you know the most common risk factor for corporate cybercrime? Employees. Download Kaspersky Lab’s Top 10 Tips for Educating Employees about Cybersecurity.
Tags : 
kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach, security, virtualization, business technology
    
Kaspersky
Published By: Kaspersky     Published Date: Nov 12, 2014
Download Kaspersky Lab’s latest eBook, Rethinking Security: Fighting Known, Unknown, and Advanced Threats, to learn more about the evolution of cyberthreats that put your business at risk.
Tags : 
kaspersky, cybersecurity, cyberattack, hackers, it security, data protection
    
Kaspersky
Published By: Modis     Published Date: Mar 09, 2015
In the wake of the recent Sony data breach, customer and company privacy issues have become a hot topic in the media and the tech sector. The Sony incident and other widely covered consumer-facing data breaches experienced by Target, Home Depot, JPMorgan Chase and others have had a significant financial impact on these companies. Experts are projecting that both the number of incidents and the cost of dealing with data breaches will increase in 2015. To combat these attacks, businesses must respond with a heightened awareness of cybersecurity as well as increased spending on enterprise security as needed. Designating high level executives to lead security and hiring certified security experts are among the best practices for stronger IT security in 2015 and beyond. Download to learn more!
Tags : 
modis, security challenges, it spending, privacy concerns, cybersecurity, security experts, data breaches, consumer facing breaches, security, it management
    
Modis
Published By: Microsoft Office 365     Published Date: Sep 20, 2016
Data security isn’t just about data security. It’s about job security. And marketing. And finance. And company valuation. Download the new eBook to see what questions you need to ask about your organization’s security measures, why they matter, and what else you need to know. Here’s what you need to ask your team: 1. Do you feel limited by budget or staff size? 2. How often do you see unsanctioned cloud services in use? 3. Are you protecting yourself against insider threats? 4. Do you have a cybersecurity task force in place? 5. Is your "bring your own device" policy secure?
Tags : 
    
Microsoft Office 365
Published By: IBM     Published Date: May 12, 2015
This white paper describes a holistic approach to healthcare cybersecurity, which incorporates sophisticated big data analytics to help better protect and secure the vast array of data healthcare organizations maintain.
Tags : 
healthcare, cybersecurity, big data, security, business technology
    
IBM
Published By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : 
mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments, vulnerability management, web application security
    
McAfee
Published By: Palo Alto Networks     Published Date: Jun 19, 2014
APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.
Tags : 
palo alto, cybersecurity, ebook, internet security, cyberattack, cybercrime, network security, hackers, virus, spam, malware, application security
    
Palo Alto Networks
Published By: iboss     Published Date: Jan 22, 2018
Choosing the right cybersecurity solution has never been more important. Organizations need to understand why all security technologies are not alike.
Tags : 
iboss, cybersecurity, intrusion detection, security, cyberattack
    
iboss
Published By: iboss     Published Date: Jan 22, 2018
On behalf of iboss, Researchscape conducted an online survey of 104 U.S. IT executives at large enterprises to better understand attitudes and initiatives for addressing cybersecurity.
Tags : 
iboss, remote access, byod, cybersecurity, mobile workforce, business technology
    
iboss
Published By: Schneider Electric     Published Date: May 03, 2018
Wireless technology is increasingly used in machine safety applications. New solutions introduce mobility and offer higher levels of flexibility and safety for plant floor operators. This eBook explores how modern wireless implementations can increase user safety and mobility, reduce installation costs, and boost productivity.
Tags : 
safety, wireless, efficiency, smart machines, machine safety, productivity, security, cybersecurity, industrial automation, plant, factory
    
Schneider Electric
Published By: Schneider Electric     Published Date: May 03, 2018
The industry of tomorrow will be different. More volatile markets, new technology capabilities, and increased pressure on performance will precipitate the change. But with change comes opportunity…the Industrial Internet of Things (IIoT) has unleashed huge potential for industrial customers. There is a reported $14 trillion of new business growth up for grabs – and your goal of better business performance can help you earn your fair share of that growth. How can you make the most of this potential? Read the rest of this eBook to learn more.
Tags : 
vsd, vfd, variable speed drives, variable frequency drives, iiot, water, wastewater, oil & gas, pumping, mining, drives, service, industrial automation, cybersecurity, achilles, food & beverage
    
Schneider Electric
Published By: OneNeck IT Services     Published Date: May 30, 2018
Use a proven framework now, protect your data and meet compliance mandates tomorrow.
Tags : 
    
OneNeck IT Services
Published By: OneNeck IT Services     Published Date: May 30, 2018
Learn the real risks, and then find out how to reduce your exposure and combat attackers with Cisco’s 2018 Annual Cybersecurity Report.
Tags : 
    
OneNeck IT Services
Published By: OneNeck IT Services     Published Date: May 30, 2018
Learn the real risks, and then find out how to reduce your exposure and combat attackers with Cisco’s 2018 Annual Cybersecurity Report.
Tags : 
    
OneNeck IT Services
Published By: OneNeck IT Services     Published Date: May 30, 2018
Use a proven framework now, protect your data and meet compliance mandates tomorrow.
Tags : 
    
OneNeck IT Services
Published By: SAS     Published Date: Aug 03, 2016
A paradigm shift is underway in the cybersecurity industry. Cybersecurity professionals are moving from a focus on attacker prevention to attacker detection. Preventing the “bad guys” from getting in is still important, but cyber adversaries are increasingly able to bypass even the most sophisticated network defenses. Once inside, it is more important than ever to find these attackers fast, before their activities get buried in the daily volume and pulse of network communications. This is where security analytics holds promise. Security analytics provides the necessary and timely visibility into normal and abnormal network behavior. This visibility enables devices and entities acting suspiciously to be quickly identified and investigated.
Tags : 
cyber security, security, best practices, attacker prevention, paradigm shift, security analytics, technology, business technology
    
SAS
Published By: CSC     Published Date: Oct 18, 2010
The CSC Security Stack white paper lifts the fog of complexity with regards to the cybersecurity challenges businesses and governments face.
Tags : 
cybersecurity, security, information technology
    
CSC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com