attacks

Results 101 - 125 of 959Sort Results By: Published Date | Title | Company Name
Published By: Splunk     Published Date: Aug 21, 2018
While the modern enterprise embraces digital technology, it is also at risk of cyberattacks. In this guide, “The Essential Guide to Security”, we map out how organizations can use machine data for specific use cases and get started addressing threats and security challenges. Download your complimentary copy to learn: *How to assess your organization’s security maturity *What specific threats you should be looking for and how to fight them *What data sources are needed for specific use cases *What software solution you need to get ahead of different threats
Tags : 
    
Splunk
Published By: MobileIron     Published Date: Aug 20, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, learning
    
MobileIron
Published By: Carbon Black     Published Date: Aug 20, 2018
Companies are facing massive cyber security challenges – many of which are rooted in the endpoint. In fact, according to IDC, 70% of successful breaches begin at the endpoint. If you are a Kaspersky Lab customer, and still have breaches in your endpoint security, then something isn’t working. Perhaps you’re struggling to prevent advanced attacks, or your security team may be burdened by maintaining overly complex policies. You and your end users may even be facing performance issues. If you are experiencing any of these issues, then your endpoint security products may actually be creating more problems than they solve. Ask these questions and find out for yourself.
Tags : 
    
Carbon Black
Published By: Carbon Black     Published Date: Aug 20, 2018
Companies are facing massive cyber security challenges – many of which are rooted in the endpoint. In fact, according to IDC, 70% of successful breaches begin at the endpoint. If you are a McAfee customer, and still have breaches in your endpoint security, then something isn’t working. Perhaps you’re struggling to prevent advanced attacks, or your security team may be burdened by maintaining overly complex policies. You and your end users may even be facing performance issues. If you are experiencing any of these challenges, then your endpoint security products may actually be creating more problems than they solve. Ask yourself these questions for a cybersecurity reality check.
Tags : 
    
Carbon Black
Published By: ServiceNow     Published Date: Aug 20, 2018
Find out how leading healthcare providers are using a proactive approach to keep their EHR and supporting infrastructure continually running and compliant with strict regulations for health data security and privacy. Learn more about keeping critical systems operational and sensitive data secure. Download this white paper to see how eliminating outages and combatting cyberattacks can help improve patient care.
Tags : 
    
ServiceNow
Published By: F5 Networks Inc     Published Date: Aug 16, 2018
Integrated on-premises solutions offer tight control and flexibility, but can be quickly overwhelmed by a large volumetric attack. Managed cloudbased services deliver protection from those largeattacks, but can be expensive if used for all traffic, all the time. By using a combination of on-premises security devices and a cloud-based scrubbing service to handle volumetric attacks, organizations maintain control, while spinning up cloud-protection services as needed to handle the largest volumetric floods.
Tags : 
model, ddos, protection, solutions
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 16, 2018
As signaling and scrubbing technology evolve (and as your solutions become more and more adaptable), DDoS attacks will become less effective and less attractive to would-be adversaries. The time will soon come when a 1 Tb attack from an IoT botnet will seem like a mere annoyance, rather than a catastrophic event—if you even notice it at all. So how do you get there faster? Plan ahead by designing a defense in-depth DDoS strategy and partner with a trusted security provider to handle the large attacks. Upfront preparation will pay off when the threat of DDoS attacks no longer keeps you up at night.
Tags : 
strategy, ddos, spam, technology, solutions
    
F5 Networks Inc
Published By: Mimecast     Published Date: Aug 16, 2018
Email. You use it constantly. And it’s the number-one application to keep your organization functioning, lines of communication flowing, and productivity seamless. Organizations need email to stay up-and running all the time. After all, it’s supposed to just work, right? This is where trouble often sets in. Cybercriminals use email constantly, too. It’s the number-one vector used to initiate attacks like malware delivery (think ransomware), impersonations and phishing attacks. In fact, almost 90% of organizations* have seen the volume of phishing attacks either rise or stay the same over the past 12 months. Internal threats have also been on the rise: Most organizations have encountered internal threats driven by careless employees (88%), compromised accounts (80%) or malicious insiders (70%) over the last year.
Tags : 
    
Mimecast
Published By: Carbon Black     Published Date: Aug 14, 2018
Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able to carry out their attack objectives.
Tags : 
    
Carbon Black
Published By: Centrica Business Solutions     Published Date: Aug 14, 2018
It's demanding times for businesses. Facing risks as diverse as extreme weather and cyber-attacks, ?rms are focusing more intently on business continuity plans. At the same time, the digital revolution is changing lifestyles, disrupting business models and acting as a catalyst for change. Energy itself is undergoing a transformation, as generation moves towards renewables and decentralization, while technological advances present new opportunities. Energy now has the potential to deliver competitive advantage, to enhance sustainability and resilience, and to power innovative business models. But equally, the range of new options available is making the management of energy more complex. Read this thought leadership paper to find out how energy can drive your business strategy.
Tags : 
business, strategy, energy, efficiency, performance
    
Centrica Business Solutions
Published By: Oracle     Published Date: Aug 09, 2018
The purpose of IT backup and recovery systems is to avoid data loss and recover quickly, thereby minimizing downtime costs. Traditional storage-centric data protection architectures such as Purpose Built Backup Appliances (PBBAs), and the conventional backup and restore processing supporting them, are prone to failure on recovery. This is because the processes, both automated and manual, are too numerous, too complex, and too difficult to test adequately. In turn this leads to unacceptable levels of failure for today’s mission critical applications, and a poor foundation for digital transformation initiatives. Governments are taking notice. Heightened regulatory compliance requirements have implications for data recovery processes and are an unwelcome but timely catalyst for companies to get their recovery houses in order. Onerous malware, such as ransomware and other cyber attacks increase the imperative for organizations to have highly granular recovery mechanisms in place that allow
Tags : 
    
Oracle
Published By: Dell Server     Published Date: Aug 08, 2018
PowerEdge servers protect your customers and business with integrated security Analysts say attacks on firmware are becoming a greater threat to systems, making a cyber-resilient server architecture essential to the modern data center. Dell EMC PowerEdge servers, powered by Intel® Xeon® Scalable processors, deliver comprehensive management tools and robust layers of security to protect hardware and firmware throughout the server lifecycle.
Tags : 
    
Dell Server
Published By: Oracle     Published Date: Aug 02, 2018
Enterprises like yours face the growing risk of cyberattacks, which increases your exposure to the risk of data loss. One of the most menacing forms of these is ransomware, where your data is encrypted and literally held ransom—until you pay cybercriminals to release it, or you recover your data from a point in time before your systems were attacked. Such attacks and data losses make headlines —damaging your organization’s reputation. And with new regulations concerning data protection coming into force (such as those introduced by the US Department of the Treasury and the European Union) failing to prepare for a quick recovery from a cyberattack could mean serious financial penalties.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 01, 2018
Your enterprise runs its critical applications on Oracle Databases, and as an enterprise IT leader, maintaining the performance and availability of your databases is among your top priorities. Any degradation in performance or loss of data could result in serious business disruption and loss of revenue, so protecting this vital asset is a must. There are many causes of data loss— administration errors, system or media failures, cyberattacks, and more—but we often overlook design flaws in the very systems meant to protect data: general-purpose backup systems.
Tags : 
    
Oracle
Published By: Great Bay Software     Published Date: Jul 16, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Lenovo and Intel     Published Date: Jul 10, 2018
The risk of cyber attacks and the cost of failure are increasing. Penalties associated with failure are only going to increase. And these challenges are compounded by increasing collaboration, use of cloud-based solutions, and an increasingly mobile workforce. Join experts from Forrester, Lenovo and Microsoft as they explore Forrester’s newly updated Zero Trust Extended framework. Then Lenovo covers how the four core components of its Data, Identity, Online and Device (DIODe) approach can minimize risk to data and critical IT. By taking these important steps toward a full Zero Trust Extended framework, you can: Protect the business from advanced threats Reduce the impact of breaches Easily support new business and operating models Rise to the challenge of evolving regulations like FISMA, HIPPA, PCI and GDPR
Tags : 
    
Lenovo and Intel
Published By: Akamai Technologies     Published Date: Jul 02, 2018
What to expect and how to prepare your best defense DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jul 02, 2018
Gartner named Akamai a Leader in their 2017 Magic Quadrant for Web Application Firewalls. A web application firewall is an essential element in your defense against application-layer attacks, which pose an ever-greater threat to productivity and security. The Akamai approach to WAF combines: An anomaly detection model A repeatable testing framework to measure effectiveness Threat intelligence to identify the latest threats A cloud platform for global scale Managed security services to help organizations better protect their websites and web applications over time
Tags : 
    
Akamai Technologies
Published By: Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
With cybercriminals threatening nations globally, cybersecurity is taking a front seat in many regions. Most notably, the European Union (EU) has adopted regulations to combat the threats. Against the backdrop of increasingly sophisticated cyberattacks, the EU has set forth rules and procedures for enhanced cybersecurity, along with penalties for noncompliance, in the form of the General Data Protection Regulation (GDPR). This new body of mandated policies and procedures aims to protect EU member personal information collected and/or stored by organizations. Read more in the GDPR business brief.
Tags : 
data, gdpr, global, nationally, cybercriminals
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
safe, lite, cybersecurity, data
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) technologies are rapidly moving beyond the realms of academia and speculative fiction to enter the commercial mainstream, with innovative products that utilize AI transforming how we access and leverage information. AI is also becoming strategically important to national defense and in securing our critical financial, energy, intelligence, and communications infrastructures against state-sponsored cyberattacks. According to an October 2016 report issued by the federal government’s National Science and Technology Council Committee on Technology (NSTCC), “AI has important applications in cybersecurity, and is expected to play an increasing role for both defensive and offensive cyber measures.” Based on this projection, the NSTCC has issued a National Artificial Intelligence Research and Development Strategic Plan to guide federally-funded research and development. The era of AI has most definitely arrived, but many still don’t understand the basics of this im
Tags : 
artificial, intelligence, cybersecurity, machine
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today’s cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : 
ransomware, threats, cyber, security, data
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : 
cylance, endpoint, protection, cyber, security
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
Fileless attacks surged in 2017, largely due to their ability to bypass traditional antivirus solutions. Last year was host to several fileless malware victories. OceanLotus Group infiltrated Asian corporations during Operation Cobalt Kitty, and conducted nearly six months of fileless operations before detection. Ransomware hall-of-famers Petya and WannaCry both implemented fileless techniques in their kill chains. Every major player in information security agrees that fileless attacks are difficult to stop, and the threats are growing worse. Abandoning files is a logical and tactical response to traditional AV solutions which have overcommitted to file-intensive and signature-based blacklists. What can security solutions offer when there are no infected files to detect? How will a blacklist stop an aggressor that only uses legitimate system resources? The security landscape is changing and the divide between traditional AV products and next-generation security solutions is growing wider by the day. Cylance® has built a reputation on security driven by artificial intelligence and provides a frontline defense against fileless malware. This document details how Cylance protects organizations.
Tags : 
malware, predictive, test, response
    
Cylance
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com