cyber

Results 201 - 225 of 1355Sort Results By: Published Date | Title | Company Name
Published By: Limelight     Published Date: Feb 16, 2018
Websites are indispensable for many companies to build their profits, but as the threat of cyber attacks increases, websites can also be a serious risk factor. Therefore companies need to simultaneously develop both the convenience and security of websites. This whitepaper outlines the optimal solution for smartly achieving these two aims at the same time.
Tags : 
content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security
    
Limelight
Published By: Limelight     Published Date: Feb 16, 2018
DDoS attacks have long been known as the main form of cyber attack risk. “The Financial Inspection Manual” revised by the Japanese government’s Financial Services Agency in April 2015, identifies the risk of "DDoS attacks", and the need to take countermeasures is strongly emphasized. Other government agencies also acknowledge the frequency and severity of DDoS attacks. However, a clear method to completely prevent DDoS attacks has not been established yet. Why is that? What are the best measures that companies can take at the present time?
Tags : 
content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security
    
Limelight
Published By: Juniper Networks     Published Date: Oct 19, 2015
In der neuen Studie der RAND Corporation „The Defender’s Dilemma: Charting a Course Toward Cybersecurity“ wird ein bisher einzigartiges heuristisches Modell vorgestellt, das Unternehmen dabei unterstützt, ökonomische Faktoren und Herausforderungen zu erkennen.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 19, 2015
Une nouvelle enquête menée par RAND Corporation, intitulée The Defender’s Dilemma: Charting a Course Toward Cybersecurity (Le dilemme de la défense : orientation en matière de cybersécurité), présente un modèle heuristique inédit permettant d'aider les entreprises à identifier les moteurs économiques et les défis liés à la défense.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 19, 2015
New Juniper Networks-sponsored research, by the RAND Corporation, “The Defender’s Dilemma: Charting a Course Toward Cybersecurity,” introduces a first-of-its-kind heuristic model that helps companies map the economic drivers and challenges of defense.
Tags : 
juniper, rand, cybercrime, cybersecurity, threat, malware
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 20, 2015
The SRX Series features a carrier-grade next-generation firewall with layered security services such as application security, unified threat management (UTM), integrated IPS, and advanced integrated threat intelligence to guard against cyber threats and malware.
Tags : 
juniper, network, srx, gateway, reliability analysis, firewall, threat management
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 20, 2015
RAND reports present research findings and objective analysis that address the challenges facing the public and private sectors.
Tags : 
juniper, cybercrime, data, narkets, research, analysis
    
Juniper Networks
Published By: Proofpoint     Published Date: Apr 28, 2017
Managing Business Email Compromise and Impostor Threats to Keep Your Organisation Protected
Tags : 
security, threat and vulnerability management, security, cyber attacks, email, threat detection
    
Proofpoint
Published By: Proofpoint     Published Date: Apr 28, 2017
Read on to find out how an advanced email security solution can provide better security and compliance defences in today’s stormy cybersecurity environment.
Tags : 
cyber security, cybersecurity, security, compliance, threat detection, treat and vulnerability management
    
Proofpoint
Published By: Proofpoint     Published Date: Jun 12, 2017
Ransomware ist eine alte Bedrohung, die jüngst ein fulminantes Comeback machte. Diese Art von Malware, deren Namen auf dem englischen Wort für Lösegeld (ransom) beruht und auf die Zahlung verweist, die nach dem dem Kidnapping der Dateien von den Opfern geleistet werden muss, entwickelte sich schnell zu einem der beliebtesten Cyberangriffe. Nahezu ein Viertel aller E-Mail-Angriffe mit schädlichen Dokumentdateien enthalten derzeit einen Ransomware-Stamm namens „Locky“.
Tags : 
    
Proofpoint
Published By: Proofpoint     Published Date: Jun 22, 2017
Human targeted attacks continued to lead the pack in 2016. Attackers’ used automation and personalisation to increase the volume and click-through rates of their campaigns. Taking a page from the B2B e-marketer’s playbook, cyber criminals are adopting marketing best practices and sending their campaigns on Tuesdays and Thursdays when click-through rates are higher. Meanwhile, BEC and credential phishing attacks targeted the human factor directly--no technical exploits needed. Instead, they used social engineering to persuade victims into sending money, sensitive information and account credentials. Timing is everything—attackers know that hitting your employees with a well-crafted email at the just the right time produces the best results. Of course, this varies by region. So if you are responsible for worldwide SecOps, you need visibility into not only attack patterns but also when and which employees tend to click.
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Proofpoint
Published By: IBM APAC     Published Date: Aug 22, 2017
For any sized organization, securing data and networks today is a daunting task. New vulnerabilities are discovered almost daily; new malware strains are developed as soon as a detection script is written for the old ones; and cybercriminals can buy prepackaged exploit kits on the Darknet backed by professional support teams. As a security analyst, you need more than a few point solutions designed to defend the network’s edge. You need visibility, perspective and an innate sense of when things just don’t seem right.
Tags : 
ibm, qradar, cloud, analytics, flexibility, scalability, organization
    
IBM APAC
Published By: Akamai     Published Date: Mar 10, 2012
This white paper assesses the current cyber-threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos
    
Akamai
Published By: Logrhythm     Published Date: Sep 05, 2017
The traditional approach to cybersecurity has been to use a prevention-centric strategy focused on blocking attacks. While prevention-centric approaches do stop many threats, many of today’s advanced and motivated threat actors are circumventing these defences with creative, stealthy, targeted, and persistent attacks that often go undetected for significant periods of time.
Tags : 
reconnaissance, initial compromise, command control, lateral movement, target attainment, corruption
    
Logrhythm
Published By: Logrhythm     Published Date: Sep 05, 2017
The purpose of this white paper is to show you how you can successfully build a SOC, even with limited resources. The paper first explains the basics of the Cyber Attack Lifecycle and the need to address it through the Threat Lifecycle Management framework. Next, the paper explains the basics of SOCs, providing details of what SOCs mean in terms of people, processes, and technology. Finally, the paper walks you through a methodology for building a SOC with limited resources, focusing on tactics to make your rollout smooth and successful. After reading this paper, you should be ready to start planning your own SOC.
Tags : 
reconnaissance, initial compromise, command control, lateral movement, target attainment, corruption
    
Logrhythm
Published By: Logrhythm     Published Date: Sep 11, 2017
Der traditionelle Ansatz der Cyber-Sicherheit besteht in einer präventionsorientierten Strategie, die darauf fokussiert, Angriffe zu stoppen. Und tatsächlich lassen sich mit präventionsorientierten Ansätzen viele Bedrohungen abwehren, doch den versierten und hochmotivierten Bedrohungsakteuren von heute gelingt es immer öfter, diese Abwehrmaßnahmen mit kreativen, verdeckten, gezielten und permanenten Angriffen zu umgehen, die oft lange unentdeckt bleiben.
Tags : 
network, cloud saas, users, mobile devices, iot, malicious insiders, hacktivists
    
Logrhythm
Published By: Logrhythm     Published Date: Sep 11, 2017
Threat Lifecycle Management ist die entscheidende Voraussetzung, um Angriffe in einer möglichst frühen Phase ihres Lebenszyklus zu erkennen und zu stoppen. TLM vereint zahlreiche Fähigkeiten und Funktionen, die es ermöglichen, neue Bedrohungen und Angriffe auf die Unternehmenssysteme zu erkennen; festzustellen, welche Risiken sie mit sich bringen; die Risiken zu minimieren; und die nötigen Maßnahmen zu ergreifen, um den Normalbetrieb wieder aufnehmen zu können. TLM hat das Ziel, schädliche Cybervorfälle, die durch erfolgreiche Angriffe auf Systeme, Netzwerke und Daten verursacht werden können, umfassend zu bewältigen beziehungsweise zu verhindern.
Tags : 
einleitung, menschen, prozesse, technologien, eine strategie entwickeln
    
Logrhythm
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. The Dell EMC PowerEdge server systems are the CIO’s key tools in this transformation. They are the bedrock of the modern data center – providing scalable system architectures that ensures control of the IT lifecycle while delivering a cyber-resilient environment. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. The Dell EMC PowerEdge server powered by Intel® Xeon® Platinum processor systems are the CIO’s key tools in this transformation. They are the bedrock of the modern data center – providing scalable system architectures that ensures control of the IT lifecycle while delivering a cyber-resilient environment. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Schneider Electric     Published Date: Jun 03, 2019
New digital technology makes it feasible to integrate process control and safety instrumented functions within a common automation infrastructure. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 03, 2019
Leveraging IIoT advancements, learn how to break traditional barriers between your power and process control systems to solve challenges across the full lifecycle of the plant. Download the white paper to learn more.
Tags : 
power, digital transformation, industrial internal of things, smart control, optimized assets, future of automation, reliability, safety
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 03, 2019
Industrial Internet of Things (IIoT) technologies and concepts can transform and enhance process safety practices if appropriately applied. Download the white paper for guidance on leveraging IIoT tools and techniques to deliver industrial safety in a profitable manner.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 03, 2019
Industrial process safety management has evolved beyond simple functional safety. Some companies are at risk because management and business process aspects are not integrated into the overall safety plan. Such gaps can impact both operational integrity and profitable performance. Explore the change drivers affecting plant process safety management and learn how operators can find, measure, and manage gaps to maintain safe conditions and improve profitability. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 03, 2019
The demands of modern IIoT applications increases the complexity of systems infrastructure and puts additional pressure on IT and OT security. As the frequency and sophistication of cyber-attacks increase, operations must leverage industry standards to achieve consistent protection. This paper will address how IEC62443 can be applied to industrial control systems and help readers understand the various priorities and steps required to help mitigate cyber threats.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, ecostruxture plant
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 03, 2019
Since the sepia-toned days of the early 19th century, industry has sought effective ways to control manufacturing and production processes. New technology has greatly influenced factories and plants, resulting in new operational approaches to maximize benefits and achieve 100% ROI in a very short time. Download the white paper to learn more.
Tags : 
process control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability
    
Schneider Electric
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search