attack

Results 1 - 25 of 1568Sort Results By: Published Date | Title | Company Name
Published By: Dell APAC - EMC     Published Date: May 25, 2020
As an IT decision maker, you’re focused on finding effective solutions you can implement quickly and efficiently to address the challenges specific to your business. Ensuring that security is built into every solution is critical from the start. That can mean: • Determining how to introduce new technologies to keep your growing workforce secure — wherever they work • Evaluating whether existing devices and infrastructure are vulnerable to attack, and how to close security gaps • Mitigating internal and external risks • Applying robust data-protection policies • And more A trusted partner can help you identify and deploy the technologies you need to keep devices, infrastructure and data more secure, so you can focus on daily routines and invest in innovation. Dell Technologies with Intel® is poised to be your go-to technology partner.
Tags : 
    
Dell APAC - EMC
Published By: Crowdstrike     Published Date: Jul 01, 2020
A year in cybersecurity is often marked by how disruptive the activity observed was — not just from a destructive standpoint, but also from the perspective of whether day-to-day life was affected. By any such measure, 2019 was an active year. From U.S. school districts to asset management firms, from manufacturing to media, ransomware attacks affected multitudes of people. Disruption in 2019 was not punctuated by a single destructive wiper; rather, it was plagued by sustained operations targeting the underpinnings of our society. The particularly disruptive impact that ransomware had across all sectors is addressed at the beginning of this report, followed by an assessment of additional eCrime threats.
Tags : 
    
Crowdstrike
Published By: Crowdstrike     Published Date: Jul 01, 2020
All organizations can be the target of ransomware, where users’ files or computers are taken hostage or system access is hindered until a ransom demand is met. And although big game hunting is on the rise — where ransomware operators target large enterprise organizations to gain huge payouts — ransomware is frequently aimed at small and medium-sized organizations, including state and local governments, which are often more vulnerable to attacks. Organizations of all shapes and sizes should continue to stay alert and on top of their security. This paper explains the impact of ransomware on small and medium-sized organizations, explores factors that lead to increased vulnerability and offers advice on how to protect and secure your organization.
Tags : 
    
Crowdstrike
Published By: Crowdstrike     Published Date: Jul 01, 2020
There’s no question that ransomware is a growing threat. High-profile attacks that crippled multiple U.S. cities, including Baltimore, Maryland, and Park City, Utah, made headlines in 2019. However, those attacks reflect only the public side of a much larger cybercriminal industry that is constantly innovating its capabilities. In fact, ransomware is one of the fastest growing threats in cybersecurity, with damages predicted to build to $20 billion globally by 2021, up from “only” $345 million in 2015. This paper explains the evolution of ransomware by breaking down the new trends in online extortion threats, and provides prescriptive advice on how to protect and secure your organization against such an attack.
Tags : 
    
Crowdstrike
Published By: Sangfor Technologies APAC     Published Date: Jun 09, 2020
Attackers have been moving away from the “spray and pray” attack approach, a method which was widely used in past years to successfully spread ransomware to a large number of organizations. While successful in the initial infection of the organizations, many infected machines were attached to less critical or valuable systems, meaning organizations would often not pay the ransom and were also alerted to security vulnerabilities – which they then repaired. With organizations on high-alert for attack and in?ltration, hackers found it more difficult to infect organizations and experienced a reduced success rate in many attacks. To combat this low success rate, attackers changed tactics, now spending more time and resources developing more powerful malware, targeting more valuable systems and more lucrative industries and organizations. The end-result was fewer organizations suffering crippling attacks, but signi?cantly higher and more consistent ransomware payouts.
Tags : 
    
Sangfor Technologies APAC
Published By: Intel     Published Date: Jun 01, 2020
The cybersecurity landscape is shifting at an accelerating rate. As organizations witness a rise in sophisticated attacks, the Intel vPro® platform—built to give businesses a broad and solid base for performance, security, stability, and manageability—is offering a strong response to these new threats through a proactive, hardware-based defense.
Tags : 
    
Intel
Published By: Fortinet EMEA     Published Date: May 14, 2020
Corporate DevOps teams are leading the way to the cloud, but many are overlooking the full security implications of the move. If they simply accept the security offerings of their cloud platform, they are likely to leave gaps that attackers can exploit to steal data or infiltrate other areas of the corporate network. There are at least five security areas that security architects need to ensure they have covered when building and managing security in the cloud. Fortinet offers a critical layer of security that integrates with the broader security architecture. It includes solutions for cloud platform security management, native integration of purpose-built security into the cloud platform, as well as web application and application programming interface (API) protection. It also provides integrations that help DevOps teams to automate security tasks in their cloud environments. All these help organizations achieve a consistent security posture and an effective security life-cycle manag
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: May 14, 2020
Most organizations are in the midst of some form of digital innovation (DI) - leveraging technology to achieve specific goals—and ultimately deliver greater value to their customers. But DI also brings disruption. Disruption in the form of an expanded attack surface and the introduction of a more sophisticated threat landscape. Disruption can also lead to increased complexity as organizations try to counter these new threats with a range of new security solutions. Finally, maintaining compliance with relevant industy and regulatory standards such as the General Data Protection Regulation (GDPR) becomes even more of a challenge. However, despite these issues, one key DI has rapidly going mainstream - software-defined wide-area network (SD-WAN). Unfortunately, SD-WAN is a prime example of the paradox of DI: a transformative technology that can potentially move the business to the next level, but the expanded attack surface it creates can expose the organization to significant risk.
Tags : 
    
Fortinet EMEA
Published By: Menlo Security     Published Date: Apr 30, 2020
Cloud applications, such as Office 365 and G Suite, offer improved productivity but leave users susceptible to new forms of attacks. Network architectures not configured for direct-to-Internet connectivity cannot adapt to meet these security concerns that arise from greater SaaS adoption. Cloud-delivered security offers many advantages to meet the demands of SaaS and move beyond accepting network security as “almost safe.” A critical component of this modern security architecture is web isolation—the practice of moving the threat of attack away from the endpoint and into the cloud.
Tags : 
    
Menlo Security
Published By: Menlo Security     Published Date: Apr 30, 2020
Zero Trust Internet is the solution for 100% email and web security because it considers all traffic to be potentially dangerous and isolates it, instead of trying to classify email and websites as either "safe" or "dangerous." Menlo Security’s Isolation Core™ embodies the principles of Zero Trust Internet to create a technical milestone in cybersecurity. The Isolation Core™ rewrites incoming web code, removes active content, and safely projects inactive content to end-user devices without lag. All content goes through the same process to ensure full, proactive protection. Download this whitepaper to understand: • How the Zero Trust Internet paradigm creates a safe browsing and email experience • The weakness of traditional network architectures to safeguard the end-user experience • How Menlo Security helped a Fortune 100 company achieve zero malware attacks in six months while adhering to Zero Trust Internet practices with our Isolation Core™
Tags : 
    
Menlo Security
Published By: Menlo Security     Published Date: Apr 30, 2020
Credential Phishing—Uniquely Targeting Individuals with Access to Valuable Data and Systems. The most notorious credential phishing campaign was the attack on John Podesta, the chairman of the Hillary Clinton presidential campaign during the 2016 election. But while many know about this attack, few understand what and how it happened. Credential phishing is a rapidly growing form of cyberattack and security professionals need to better understand these increasingly common and destructive forms of cyberattacks. This whitepaper examines: • What is credential phishing? • What are the risks to my organisation? • What can I do to stop them?
Tags : 
    
Menlo Security
Published By: Menlo Security     Published Date: Apr 30, 2020
The Japan Pension Service experienced a massive cyberattack in 2015 when an employee unknowingly opened a virus-laced email attachment. The attackers were able to steal the data of 1.25 million people, the largest successful attack in Japan. After the attack, the Ministry of Internal Affairs and Communication created the Internet Isolation Guideline for businesses. Read how the largest corporation in Japan achieves 100% malware protection without impacting end-user experience or convenience.
Tags : 
    
Menlo Security
Published By: Ensign InfoSecurity     Published Date: Jun 19, 2020
2019 was yet another challenging year, as cybercrimes continued to plague enterprises and everyday users of digital technology. Data breaches were reported across multiple industries, which saw some of Singapore’s high-profile organisations hacked, and their sensitive information stolen. The Ensign Cyber Threat Landscape Report 2020 aims to provide you with detailed insights into the most prevalent threats observed in Singapore’s cyber landscape. Through detailed analysis of key security insights and threat intelligence information, the report identifies the cyber threats and trends that Singapore faced in 2019. It also offers threat insights based on the stages of the MITRE ATT&CK® framework, as well as the best practices for safeguarding against cyber threats. Highlights from the report: Details on the top cyber attack vectors Insights into the most targeted industries Top threat attack sources Threat insights based on the stages of the MITRE ATT&CK® framework Analysis of the most
Tags : 
    
Ensign InfoSecurity
Published By: Ensign InfoSecurity     Published Date: Jun 19, 2020
In 2019, the number of cyber threats continued to rise, compromising and putting the spotlight on some critical infrastructure sectors and high-profile organisations. Find out the top threat attack vectors enterprises in Singapore faced the previous year, as well as the country’s most targeted industries.
Tags : 
    
Ensign InfoSecurity
Published By: Fortinet     Published Date: Jul 02, 2020
"As digital innovations such as widespread adoption of public clouds transform the very nature of our business, the impacts of these changes on the corporate network are rapidly escalating. To adapt to these changes, many organizations are embracing SD-WAN with its promise to deliver direct cloud access, better application performance, greater agility and lower cost. But while these benefits are achievable, they can all too easily be negated by a failure to consider the inherent security implications of an expanded attack surface, and increased vulnerability to sophisticated, targeted attacks. This White Paper expands on the various benefits and challenges and shows how to navigate a path to successful implementation. Read more."
Tags : 
    
Fortinet
Published By: Fortinet     Published Date: Jul 02, 2020
"Segmentation of networks, devices, users, and applications has long been a best practice for supplementing edge security and breaking up flat internal networks. However, for network engineering and operations leaders who prioritize risk mitigation, achieving compliance and effective security posture management, current segmentation approaches fall short. Read more. As multi-cloud, mobile-first, Internet-of-Things (IoT), and other digital transformation initiatives bloat attack surfaces, Internal Segmentation offers a vital new approach. It addresses segmentation’s current shortcomings and is applicable to a wide range of access-control scenarios."
Tags : 
    
Fortinet
Published By: BlackBerry     Published Date: Jun 01, 2020
There are now more mobile devices in the world?—?over 7 billion?—?than there are people. But the explosion of mobile devices has also spawned a parallel, more insidious, phenomenon: the rise of mobile malware and cyberattacks Enterprises are confronting a tough challenge: the growing threat of malware attacks aimed at mobile devices, and especially the apps that run on them. According to Aberdeen, the most effective mobile security solutions should incorporate the principle of “zero trust”. While there are many mobile threat solutions on the market, CylancePROTECT delivers a uniquely powerful set of capabilities. Download this report to see how CylancePROTECT can work for you.
Tags : 
    
BlackBerry
Published By: DeepInstinct     Published Date: May 15, 2020
Have you heard of Gandcrab ransomware? The creators of this nasty string of code earned $2.5 million per week as they successfully encrypted the data of both small and large enterprises alike, forcing them to pay out their atrocious ransom demands. Then there was Nanocore, a remote access trojan, that successfully spread its tentacles into governments and banks in order to prey on highly sensitive information. The only rational conclusion that you can make from these attacks is that no industry is immune, no location beyond reach, and no enterprise safe from attack.
Tags : 
    
DeepInstinct
Published By: DeepInstinct     Published Date: Jun 12, 2020
If you were to audit a typical organization’s security stack, you would find a series of elaborate security controls built to protect specific segments of the environment, types of data, or user behaviors. Whether it is Data Loss Prevention (DLP) attempting to keep sensitive data secure or a Security Incident and Event Management (SIEM) correlating security events to identify potential threats, the security controls in the security stack primarily deal with the results of a successful attack.
Tags : 
    
DeepInstinct
Published By: Comcast Business     Published Date: Feb 07, 2020
With large sprawling networks, and a variety of communication protocols being deployed at retail stores (wireless LANs, GPRS, Bluetooth, NFC, RFID and cellular technologies among them), the entry points for attacks have multiplied substantially. Add to that list various connected applications, more digital touchpoints, smart appliances and infrastructure, in-store associates’ devices, and customers’ mobile phones and we begin to see the magnitude of not just the risk, but the complexity involved in safely yet efficiently managing the network environment.
Tags : 
    
Comcast Business
Published By: IdentityIntact for Business     Published Date: Oct 21, 2011
IdentityIntact for Business presents a comprehensive review of how your business can be better protected from data breach attacks by cyber thieves.
Tags : 
    
IdentityIntact for Business
Published By: Verisign     Published Date: May 31, 2017
Verisign has a unique view into distributed denial of service (DDos) attack trends, including attack statistics, behavioral trends and future outlook. The below data contains observations and insights about attack frequency and size derived from mitigations enacted on behalf of customers of Verisign DDoS Protection Services from January through March 2017.
Tags : 
    
Verisign
Published By: Cisco     Published Date: Mar 16, 2016
This white paper published by Frost & Sullivan and Cisco examines the role, capabilities, and advantages of service providers in the DDoS mitigation process, as well as how this role might develop in the future.
Tags : 
service providers, ddos, security, cyber security, cyber threats, cyber attack, ddos attacks
    
Cisco
Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 08, 2019
When it comes to the threat landscape, it’s important to take a look in the rearview mirror once in a while. As with driving, not only do you get a good look at what’s behind you, but you can often spot what’s coming up quick, set to overtake you. That’s the spirit of this threat report. We’ve picked out five key stories from the last year or so, not just because they were big events, but because we think these threats, or similar ones, could very well appear in the near future. Take modular threats like Emotet and VPNFilter, for example. These are threats that can deliver an on-demand menu of attacks and threats, depending on which device is infected or the intended goal of the attacker. We saw plenty of such modular threats in recent history, and wouldn’t be surprised if we see more in the future. Email remains the darling delivery method of attackers, with threats from cryptomining to Emotet using it to spread. It’s also highly likely that other threats, such as unauthorized M
Tags : 
    
Cisco EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.