cybersecurity

Results 1 - 25 of 438Sort Results By: Published Date | Title | Company Name
Published By: Secure Code Warrior     Published Date: Mar 10, 2020
"The Motorola Solutions team faced challenges that many companies could likely appreciate, including tight deadlines for feature delivery, the need for scalable security training that could flex with growing teams, as well as an uncompromising demand for products to be as secure as possible. This in-depth case study covers how the team at Motorola Solutions successfully executed a comprehensive, engaging and fun security training program that not only lifted security awareness overall, but helped to identify a new group of champions to keep the critical message of cybersecurity best practices thriving long-term."
Tags : 
    
Secure Code Warrior
Published By: Secure Code Warrior     Published Date: Mar 11, 2020
"Secure Code Warrior's Director of the Americas, Stephen Allor, hosts a webinar with Russ Wolfe of Capital One, in which they discuss the cybersecurity landscape in the BFSI sector. They reveal why financial institutions are the new innovators when it comes to rolling out new initiatives, tools and training in the fight against cyberattacks, and how other organisations can look to them as aspirational examples for secure coding excellence."
Tags : 
    
Secure Code Warrior
Published By: Secure Code Warrior     Published Date: Mar 11, 2020
"Cybersecurity is top-of-mind for most organisations, and with large-scale data breaches becoming alarmingly regular, we must change our approach. The importance of company-wide, positive security culture cannot be understated, and that means developers must be empowered to defend against common security vulnerabilities by writing secure code in the first place. Secure Code Warrior Co-Founder and CEO, Pieter Danhieux, presents in this webinar the ‘how’ and ‘why’ of making software security training a constant and positive part of developers’ everyday working lives, and how to make it fun and entertaining at the same time. You will discover how to find the security champions you didn't know you had, while nurturing security awareness across the whole team. Tune in now: Find Your Champion: How Gamification and Tournaments Reduce Risk and Build Security-Focused Software Developers."
Tags : 
    
Secure Code Warrior
Published By: VMware     Published Date: Mar 12, 2020
Because current approaches to fighting cyberattacks are only incrementally improving results, it's time to examine intrinsic security — what it is, how it works, and its impact on the enterprise's business goals.
Tags : 
    
VMware
Published By: VMware     Published Date: Mar 12, 2020
Industry report from a global study of 1001 IT Security executives and directors. Assesses state of cybersecurity in terms of technology, process & people. To be used in vertical programing, campaigns and industry thought leadership initiatives.
Tags : 
    
VMware
Published By: VMware     Published Date: Mar 16, 2020
Learn how your organization can become a cybersecurity trailblazer to drive competitive advantage. Read about best practices and results achieved across different companies in this report based on a survey of 1,001 companies conducted by Forbes Insights, in partnership with VMware.
Tags : 
    
VMware
Published By: Swimlane     Published Date: Dec 26, 2019
Is your cybersecurity team overwhelmed by security alerts? Overcome this challenge with incident response automation. This 17-page e-book examines the increasing pressures faced by cybersecurity teams, risks of ineffective alert triage and new automation capabilities that dramatically improve the efficiency of security operations. With automated incident response and security orchestration, your team can: Respond to every security alert Reduce mean time to respond (MTTR) Do more with current staff
Tags : 
    
Swimlane
Published By: HP Inc.     Published Date: Mar 06, 2020
On behalf of HP Inc., IDC surveyed 500 security decision makers and influencers at organizations in keyNorth American (200 respondents from the U.S. and Canada) and European (300 respondents from the U.K., France, and Germany) markets, across vertical sectors from across the spectrum including banking and finance, telco, and energy. Respondents were questioned on a wide range of key factors related to their organizations’ approach to endpoint security. The results, as described in this IDC InfoBrief, indicate considerable scope for critical improvements in business cybersecurity awareness. Based on responses to key questions, IDC also segmented the respondents into two groups: “Leaders” (defined by a proactive, best practice approach to endpoint security throughout) and “Followers” (often unaware of the risks associated with their endpoint devices and still with a way to go in terms of adopting a safe approach to managing their endpoint estate).
Tags : 
    
HP Inc.
Published By: HP Inc.     Published Date: Mar 06, 2020
fleetsCybersecurity risk is everywhere in your organization. But, did you know that some of your biggest vulnerabilities are hiding in plain sight? Fact is, if you are like the large corporations we’ve assessed, your organization isn’t covering common cyber-hygiene practices with your MFP and copier fleet.
Tags : 
    
HP Inc.
Published By: QTS     Published Date: Nov 04, 2016
Healthcare accounts for 21% of all cybersecurity breaches, making it the most affected business sector in the U.S. economy. Ongoing attacks are predicted to cost providers $305 billion in lifetime revenue over the next few years. Download this white paper to learn how to make healthcare cybersecurity stronger.
Tags : 
healthcare, cyber security, data security, security
    
QTS
Published By: Forcepoint     Published Date: Feb 03, 2020
Mobile devices and cloud-based applications that empower teams to work anywhere have been a boon for business productivity, agility, and innovation. However, this new way of working presents a new challenge for cybersecurity teams: securing mobile devices accessing cloud applications that store sensitive data outside the control of on-premises security solutions.
Tags : 
    
Forcepoint
Published By: Cisco EMEA     Published Date: Jun 01, 2018
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are out there—and obvious. The Cisco 2018 Annual Cybersecurity Report presents our latest security industry advances designed to help organizations and users defend against attacks. We also look at the techniques and strategies that adversaries use to break through those defenses and evade detection. The report also highlights major findings from the Cisco 2018 Security Capabilities Benchmark Study, which examines the security posture of enterprises and their perceptions of their preparedness to defend against attacks.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Jun 05, 2018
E se i responsabili della sicurezza potessero prevedere il futuro? Se sapessero che un attacco č imminente, potrebbero bloccarlo o almeno mitigarne l’impatto e si adopererebbero per mettere in sicurezza le risorse che piů necessitano protezione. In effetti gli addetti alla sicurezza sono in grado di vedere cosa si profila all’orizzonte: gli indizi sono molti (ed evidenti).
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 14, 2018
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are out there—and obvious. For years, Cisco has been warning defenders about escalating cybercriminal activity around the globe. In this, our latest annual cybersecurity report, we present data and analysis from Cisco threat researchers and several of our technology partners about attacker behavior observed over the past 12 to 18 months.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally. As a result, customers are asking more questions during the buying cycle about how their data is captured, used, transferred, shared, stored, and destroyed. In last year’s study (Cisco 2018 Privacy Maturity Benchmark Study), Cisco introduced data and insights regarding how these privacy concerns were negatively impacting the buying cycle and timelines. This year’s research updates those findings and explores the benefits associated with privacy investment. Cisco’s Data Privacy Benchmark Study utilizes data from Cisco’s Annual Cybersecurity Benchma
Tags : 
    
Cisco EMEA
Published By: Akamai Technologies     Published Date: May 05, 2017
To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing website infrastructure or within a data center with security measures in the cloud for a more robust security posture. We share Akamai’s approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics — so you can make more educated decisions about the best solutions for your needs.
Tags : 
cloud security, data, akamai
    
Akamai Technologies
Published By: Lenovo     Published Date: Mar 14, 2019
An increasingly tech-savvy workforce is changing the future of work and the workplace. The workplace is now where your people are, not where they go – whether that’s the public space of a coffee shop or private space at home. Working hours are no longer standard, dictated by the tasks to be done, not by the clock. Work tools are no longer based only on workplace technology. The same cool features used in consumer devices, such as touch, are now required for workplace devices. It’s this familiar, smart technology that keeps people, across the generations, happy, productive and engaged. This dynamic IT is the foundation for a smart workplace that will enable you to attract and keep top talent – and shape the future-ready enterprise, now.
Tags : 
dynamic it, smarttechnology, dynamicworkplace, security-first, smartit, workplacesecurity, cybersecurity, iot
    
Lenovo
Published By: Cisco     Published Date: Jul 08, 2016
Disruptors now harness the power of digital to create new sources of value that reduce costs, improve the customer experience, and scale their offerings. Digital disruptors also enjoy a decided innovation advantage over established companies: they are better able to identify new opportunities, and move faster to take advantage of them. In this intensely competitive environment, startups and agile firms are overturning incumbents with digital business models, products, and services.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Oct 11, 2016
The Cisco® 2016 Midyear Cybersecurity Report—which presents research, insights, and perspectives from Cisco Security Research—updates security professionals on the trends covered in our previous security report while also examining developments that may affect the security landscape later this year.
Tags : 
cybersecurity, attackers, http, ransomeware, malware
    
Cisco
Published By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
MIT Technology Review Survey: Executive Summary Are you prepared for the next breach? Only 6% of leaders say yes. Information security—or, the lack of it—is firmly on the radar for business and IT leaders in organizations of all sizes and in every sector. Many fear that their companies are ill-prepared to prevent, detect, and effectively respond to various types of cyberattacks, and a shortage of in-house security expertise remains of widespread concern. Those are among the initial findings of the Cybersecurity Challenges, Risks, Trends, and Impacts Survey, conducted by MIT Technology Review of approx. 225 business and IT executives, in partnership with Hewlett Packard Enterprise Security Services and FireEye Inc.
Tags : 
    
Hewlett Packard  Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
Is your organization prepared for a cyberattack? Most aren’t. 86% of organizations surveyed lack adequate cybersecurity capabilities. Read MIT Technology Review’s latest infographic, based on their survey of 225 business and IT leaders, and learn if you have cybersecurity holes and how to patch them.
Tags : 
    
Hewlett Packard  Enterprise
Published By: CrowdStrike     Published Date: Aug 01, 2017
While many organizations are guarding the front door with yesterday’s signature-based antivirus (AV) solutions, today’s unknown malware walks out the back door with all their data. What’s the answer? A new white paper, “The Rise of Machine Learning in Cybersecurity,” explains machine learning (ML) technology —what it is, how it works and why it offers better protection against the sophisticated attacks that bypass standard security measures. You’ll also learn about CrowdStrike’s exclusive ML technology and how, as part of the Falcon platform’s next-gen AV solution,it dramatically increases your ability to detect attacks that use unknown malware. Download this white paper to learn:?How different types of ML are applied in various industries and why it’s such an effective tool against unknown malware?Why ML technologies differ and what factors can increase the accuracy and effectiveness of ML ?How CrowdStrike’s ML-based technology works as part of the Falcon platform’s next-generation AV
Tags : 
    
CrowdStrike
Published By: Gigamon     Published Date: Oct 19, 2017
Read the IDG Tech Dossier, A Security Delivery Platform Benefits the Entire Organization to learn how a comprehensive, well-integrated security platform provides the foundation for the next generation of cybersecurity. By uniting a variety of security solutions and appliances for efficient operation through network visibility and security workflow orchestration, organizations benefit from continuous and pervasive network visibility, fault tolerance and scaling and optimal CPU utilization – thereby improving security and reducing cost. Download now!
Tags : 
    
Gigamon
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security
    
Limelight Networks
Published By: Dome9     Published Date: Apr 25, 2018
Organizations continue to adopt cloud computing at a rapid pace to benefit from increased efficiency, better scalability, and faster deployments. As more workloads are shifting to the cloud, cybersecurity professionals remain concerned about security of data, systems, and services in the cloud. To cope with new security challenges, security teams are forced to reassess their security posture and strategies as traditional security tools are often not suited for the challenges of dynamic, virtual and distributed cloud environments. This technology challenge is only exacerbated by the dramatic shortage of skilled cybersecurity professionals.
Tags : 
    
Dome9
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.