cyber security

Results 1 - 25 of 992Sort Results By: Published Date | Title | Company Name
Published By: MalwareBytes EMEA     Published Date: Feb 24, 2020
Advances in healthcare technologies have made patient records portable, transferable, alterable, and destructible—for both good and bad actors. The unfortunate truth is that BYOD, the boom of mHealth apps, the cloud, and the lack of awareness among staff have made healthcare cybersecurity more challenging than ever. While the interconnectedness of devices and systems promises to improve operational efficiency and patient care, it also opens the door to cybercriminals armed with sophisticated cyberweapons. The good news is that CISOs, managers, and IT specialists can start addressing these challenges today. This eBook uncovers how each role can reduce risk and increase awareness throughout the organization. And if you fill one of these vital roles, this information is invaluable.
Tags : 
    
MalwareBytes EMEA
Published By: MalwareBytes EMEA     Published Date: Feb 24, 2020
Along the edge of subway tracks in the UK is a sign that says, “Mind the gap,” warning passengers to watch out for the space between the station platform and the train. Business owners might consider these words as well when they think about the gaps in their own security. When a plan for protecting data hasn’t been fully realized, it’s easy for safety precautions to slip through the cracks. And that’s why it’s important to have a cybersecurity plan. Download ours to find out more!
Tags : 
    
MalwareBytes EMEA
Published By: CrowdStrike     Published Date: Feb 21, 2020
Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it. One advanced threat technique that is experiencing success is the use of fileless attacks, where no executable file is written to disk. The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware-free, so there’s no indication that these attacks will be subsiding anytime soon. Read this white paper to get the important information you need to successfully defend your company against stealthy fileless attacks. Download this white paper to learn: • The detailed anatomy of a fileless intrusion, including the initial compromise, gaining command and control, escalating privileges and establishing persistence • How fileless attacks exploit trusted systems — the types of processe
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Feb 21, 2020
While many organizations are guarding the front door with yesterday’s signature-based antivirus (AV) solutions, today’s unknown malware walks out the back door with all their data. What’s the answer? This white paper, “The Rise of Machine Learning in Cybersecurity,” explains machine learning (ML) technology — what it is, how it works and why it offers better protection against the sophisticated attacks that bypass standard security measures. You’ll also learn about CrowdStrike’s exclusive ML technology and how, as part of the Falcon platform’s next-gen AV solution, it dramatically increases your ability to detect attacks that use unknown malware. Download this white paper to learn: • How different types of ML are applied in various industries and why it’s such an effective tool against unknown malware • Why ML technologies differ and what factors can increase the accuracy and effectiveness of ML • How CrowdStrike’s ML-based technology works as part of the Falcon platform’s next-gene
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Feb 21, 2020
Guidance for taking any organization to the highest level of endpoint protection regardless of internal resources Organizations today have a wealth of security tools available to them but many struggle to take full advantage of the technology they have. Too often, this results in a damaging breach that could have been avoided if their solutions had been configured and updated properly or if detections had been noticed and acted on. How well your organization is doing at fully implementing its security solutions, particularly endpoint protection technology, is a reflection of your cybersecurity maturity. This white paper, “CrowdStrike Falcon Complete: How to Achieve Instant Cybersecurity Maturity for Organizations of all Sizes,” explores the challenges organizations face in getting the most out of a security solution. It also offers insights on how CrowdStrike Falcon Complete can raise you to the highest level of endpoint protection with speed and efficiency, regardless of your size an
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Feb 21, 2020
How adopting a framework can optimize cybersecurity Today’s threat landscape has created new challenges for security analysts and incident responders, as the number of alerts and their complexity have increased significantly. Organizations with small IT teams are overwhelmed, often lacking the time or resources to investigate every alert. Failing to do so means a high-risk threat might go unnoticed. This can result in a devastating breach, damaging an organization's finances and reputation. This white paper discusses how CrowdStrike is solving these challenges, by implementing the MITRE ATT&CK Framework across multiple CrowdStrike processes and product features to help improve analyst’s productivity and prevent breaches. This provides many benefits, including time savings; adding advanced context to security alerts and information; and enabling a common, shared language. However, it also provides some hidden advantages, especially concerning cybersecurity. Read this whitepaper to learn
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Feb 21, 2020
Observations gained from the front lines of Incident Response and Proactive Services in 2019 and insights that matter for 2020 The year 2019 ushered in a host of new adversaries, new attack methods and new challenges for the cybersecurity industry. The CrowdStrike® Services team faced these trials head-on, across global regions and within public companies, private industries and governmental entities spanning a variety of digital mediums. The themes and trends the Services team observed during its many investigations are presented in the CrowdStrike Services Cyber Front Lines Report. It offers a unique front-line view and greater insight into the cyber battle these seasoned security experts are waging against today’s most sophisticated adversaries. Download the report today for valuable information and guidance that can inform your security strategy for 2020 and beyond. The analysis and pragmatic steps recommended by CrowdStrike Services experts will add value to your proactive securit
Tags : 
    
CrowdStrike
Published By: ForeScout EMEA     Published Date: Feb 20, 2020
With the rise of automation, remote access, and the ever-expanding Internet of Things (IoT), IT and OT teams are collaborating at an unprecedented rate to strengthen organizational network security. Business operations that rely on machinery and physical processes are no longer disconnected from the world. With a staggering majority of devices – expected to reach more than 75 billion by 2025 [1] – connected to vast networks and the internet, cybersecurity becomes a critical focal point for the age of IoT.
Tags : 
    
ForeScout EMEA
Published By: ForeScout EMEA     Published Date: Feb 20, 2020
The Forescout device visibility and control platform has been designated a 2019 Cyber Catalyst cybersecurity solution. The platform helps organizations reduce both business and operational risk through complete situational awareness of their extended enterprise by providing continuous, unified visibility and control of all connected devices across campus, data center, cloud, and operational technology (OT) networks. This includes critical capabilities in support of asset management, device compliance, network segmentation, network access control, and incident response initiatives.
Tags : 
    
ForeScout EMEA
Published By: ForeScout EMEA     Published Date: Feb 20, 2020
In most organizations, Information Technology (IT) includes the technology used to manage and process information, while Operational Technology (OT) encompasses the devices and technology that interact with the physical world. IT and OT were, for a long time, regarded as two distinct areas of an organization. Nowadays, these two domains are converging with the rise of connected embedded devices in the Internet of Things (IoT). The IoT revolution is happening all around us, but the definition of what these ‘things’ are can be fuzzy and often incomplete. The IoT has already experienced significant growth in the past decade and is expected to reach more than 30 billion connected devices by 2022. This business transformation brings along many opportunities for increased productivity, but it also presents challenges since the number of devices in a typical organization’s network is rapidly increasing, these devices are mostly unmanaged, come from a multitude of vendors, use non-standard ope
Tags : 
    
ForeScout EMEA
Published By: Schneider Electric     Published Date: Feb 13, 2020
Digital remote monitoring services provide real-time monitoring and data analytics for data center physical infrastructure systems. These modern cloud-based platforms offer the promise of reduced downtime, reduced mean time to recovery (MTTR), less operations overhead, as well as improved energy efficiency for power and cooling systems. However, with the cost of cyber security crime projected to quadruple over the next few years reaching $2 trillion by 20191, there is concern these systems could be a successful avenue of attack for cyber criminals. This paper describes key security aspects of developing and operating digital, cloud-based remote monitoring platforms that keep data private and infrastructure systems secure from attackers. This knowledge of how these platforms should be developed and deployed is helpful when evaluating the merits of remote monitoring vendors and their solutions.
Tags : 
    
Schneider Electric
Published By: Cisco Umbrella EMEA     Published Date: Feb 11, 2020
Updated for 2020, the 2nd edition of Cisco Umbrella's popular Ransomware Defense For Dummies eBook explores the top cyber security best practices to reduce ransomware risks. Ransomware Defense For Dummies consists of 5 short chapters that explore: How it operates and its defining characteristics Cyber security best practices to reduce risks A new best-of-breed network security architecture The Cisco Ransomware Defense solution Important defense takeaways"
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Feb 11, 2020
Building on the popular Threat of the Month series, Cisco researchers looked at notable 2018 cybersecurity incidents with a fresh perspective: what do they reveal about future adversary tactics? With this lens, they chose threats that best embody what defenders should expect in the year ahead. The report contains in-depth analysis, best practices, and trends to watch.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Feb 11, 2020
Updated for 2020, the 2nd edition of Cisco Umbrella's popular Ransomware Defense For Dummies eBook explores the top cyber security best practices to reduce ransomware risks. Ransomware Defense For Dummies consists of 5 short chapters that explore: How it operates and its defining characteristics Cyber security best practices to reduce risks A new best-of-breed network security architecture The Cisco Ransomware Defense solution Important defense takeaways
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Feb 11, 2020
IT security leaders are looking for more effective cyber security strategies that don’t add complexity to their network or security operations. DNS-layer security operates on the simple principle that cyber attacks — no matter how sophisticated or unique — must originate from somewhere. By pre-emptively blocking all requests over any port or protocol to any and all suspicious “somewheres,” DNS-layer security can stop malware, phishing, command-and-control exfiltration, malicious cryptomining, ransomware, and other attacks without the burden of first having to identify the specific nature of those attacks. Learn how Cisco Umbrella delivers the fastest, simplest way to secure your network and protect your users, everywhere.
Tags : 
    
Cisco Umbrella EMEA
Published By: B Channels     Published Date: Feb 10, 2020
Cybersecurity poses a big risk for companies today. Without expert guidance, it can be challenging to know how to secure your IT environment. Amazon Web Services (AWS) places security at the heart of every offering to help you fully realize the speed and agility of the cloud. Our dedicated team of engineers works to constantly evolve our security services through core capabilities such as identity and access management, logging and monitoring, encryption and key management, network segmentation, and standard DDoS protection, as well as advanced areas like proactive threat detection. AWS and the AWS Partner Network (APN) make it easy to tailor your security to meet the requirements of your business as you grow. AWS Security Competency Partners offer fully vetted solutions and services that work within the well-architected security of AWS to protect your unique environment.
Tags : 
    
B Channels
Published By: Cisco Umbrella EMEA     Published Date: Feb 10, 2020
Securing what you can’t see is a difficult challenge. Concerned about the risks that hidden cyber threats present to your organization right now? Cisco Umbrella exposes the full extent of shadow IT with App Discovery and blocking. Gain visibility of cloud services in use and block risky apps to improve network security with three easy steps. Learn more by downloading the 3 Steps to Managing Shadow IT eBook.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Feb 10, 2020
In our latest cyber security report, we explore the ins and outs of security threat hunting and provide a how-to guide for creating a threat hunting team at your organization. With clear, easy-to-follow instructions and tips from veteran threat hunters, it’s a must-read for cyber security professionals everywhere. Learn more by downloading the Hunting for Hidden Threats – Cisco Cybersecurity 2019 Threat Report Series technical paper.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Feb 10, 2020
Network security is on the move. It’s no secret that the way people work has changed dramatically over the past few years. As highly distributed environments become the norm, cyber security teams are scrambling to provide advanced threat protection. Applications that previously resided on-premises are also on the move, as the volume of roaming workers continues to rise. Branch offices are adopting direct internet access, which is forcing a discussion on how to extend network security to protect the edge. With more users, devices, and applications connecting to the network, the number of risks and vulnerabilities is also increasing — triggering a total transformation in the IT security landscape. Learn more by downloading the 2019 Cybersecurity Trends report.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Feb 10, 2020
No one is safe - malicious cryptomining is everywhere. New findings from Cisco Umbrella research reveals a 19x increase in cryptomining malware activity on the internet in the last nine months of 2018. Researchers advise that there is no foreseeable sign of illicit cryptomining slowing down in the coming years. Find out who these cyber criminals are targeting and how to beef up your network security. Learn more by downloading the Malicious Cryptomining Moves Mainstream eBook.
Tags : 
    
Cisco Umbrella EMEA
Published By: Ensign InfoSecurity     Published Date: Feb 05, 2020
"The pressure on the Banking, Financial Services & Insurance (BFSI) industry to perform has never been greater as the digital world struggles to deal with the onslaught of more prevalent and pernicious threats. To drive growth and increase customer trust, financial institutions are taking advantage of various platforms such as mobile, cloud and social, exposing them to further cybersecurity risks. The recent news has flagged flaws in mobile and web applications as the major routes of intrusions. The Equifax incident was prominently singled out with massive amounts of its customer data being compromised due to a web-application vulnerability. Third-party vendors, including FinTech partners, continue to pose great risk to the financial industry. The 2016 Bangladesh Bank breach cost some USD81 million due to a vulnerability in SWIFT, a shared banking system. As customers continue to move away from physically transacting with banks and other institutions, more enhanced investment in se
Tags : 
    
Ensign InfoSecurity
Published By: HP Inc.     Published Date: Feb 04, 2020
The Cybersecurity landscape is constantly changing and expanding. Businesses are increasingly having to confront cyberattacks that threaten their information—and their customers’ private data. This guide is designed to help those small and medium-sized businesses with limited IT resources to strengthen their cybersecurity today, with little to no cost.
Tags : 
    
HP Inc.
Published By: HP Inc.     Published Date: Feb 04, 2020
The digital revolution has altered every aspect of modern life, and the way people work is no exception. Today’s workplace would be unrecognizable to the average worker of the past. In fact, the modern work environment has transformed substantially in the last 10 years alone, and the revolution in the way people work means IT faces more complexity than ever before.
Tags : 
    
HP Inc.
Published By: Forcepoint     Published Date: Feb 03, 2020
Mobile devices and cloud-based applications that empower teams to work anywhere have been a boon for business productivity, agility, and innovation. However, this new way of working presents a new challenge for cybersecurity teams: securing mobile devices accessing cloud applications that store sensitive data outside the control of on-premises security solutions.
Tags : 
    
Forcepoint
Published By: Cisco Umbrella EMEA     Published Date: Jan 31, 2020
Updated for 2020, the 2nd edition of Cisco Umbrella's popular Ransomware Defense For Dummies eBook explores the top cyber security best practices to reduce ransomware risks. Ransomware Defense For Dummies consists of 5 short chapters that explore: How it operates and its defining characteristics Cyber security best practices to reduce risks A new best-of-breed network security architecture The Cisco Ransomware Defense solution Important defense takeaways
Tags : 
    
Cisco Umbrella EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.