cyber defense

Results 76 - 100 of 116Sort Results By: Published Date | Title | Company Name
Published By: LogicNow     Published Date: Mar 10, 2016
Our annual health check of the global IT support market looks at the relationships between IT Service Providers and IT departments and asks, are the two sides working together in harmony, or in a state of Discord? Based on the views of over 1,300 IT departments and almost 700 IT Service Providers, this report delivers the data and vital insights that will help every IT Service Provider to focus on improving sales figures, growing their portfolio and ensuring their service matches customer expectations. Overlook at your peril!
Tags : 
logicnow, it service providers, cyberdefense, cybersecurity
    
LogicNow
Published By: AWS     Published Date: Oct 30, 2018
As cybercriminals look for new ways to break through defenses, it’s vital that organizations have access to real-time operational intelligence across their applications, services, and security infrastructure. As Recreational Equipment, Inc. (REI) migrated applications to Amazon Web Services (AWS), it needed to expand security capacity for edge protection of its AWS VPCs. REI chose Splunk for security monitoring, historical analysis, and data visualization in real time, to help it investigate events and mitigate operational risks.
Tags : 
rei, intelligent, threat, detection, edge, protection, aws, splunk
    
AWS
Published By: LogRhythm     Published Date: Apr 04, 2017
The third-annual Cyberthreat Defense Report pursues this same objective: to inform the IT security community not so much about what the bad guys are up to, but rather about how their peers globally are currently defending against threats and the changes they expect to make going forward. Based on a rigorous survey of IT security decision makers and practitioners – across not only North America and Europe, but for the first time, in Asia Pacific and Latin America as well – the Cyberthreat Defense Report examines the current and planned deployment of countermeasures against the backdrop of numerous perceptions.
Tags : 
    
LogRhythm
Published By: LogRhythm     Published Date: Feb 22, 2018
The traditional approach to cybersecurity has been to use a prevention-centric strategy focused on blocking attacks. While prevention-centric approaches do stop many threats, many of today’s advanced and motivated threat actors are circumventing these defenses with creative, stealthy, targeted, and persistent attacks that often go undetected for significant periods of time.
Tags : 
    
LogRhythm
Published By: CrowdStrike     Published Date: May 10, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: • How to collect and preserve data after a breach so that critical forensic information can be retrieved • What sort of in
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: May 10, 2018
Where to invest next: Identifying the people, processes and technology you need for an effective cybersecurity strategy Building your organization’s cybersecurity maturity doesn’t happen overnight. It takes time and thought to adequately assess all the factors that go into creating and implementing an effective security strategy, particularly what steps to take after you’ve made an initial investment in security. This white paper, “Where to Invest Next: Guidance for Maturing Your Cyber Defenses,” offers practical advice on achieving the level of cyber defense maturity that’s right for your organization. Learn why developing a security program that takes into account your risk level and the current state of your security posture is critical. You’ll also see why ensuring that everyone in the organization, from the leadership to the rank-and-file, is working toward the goal of cyber maturity is crucial to your success. Gain important insights into the cybersecurity maturity process incl
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: How to collect and preserve data after a breach so that critical forensic information can be retrieved What sort of int
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
Learn how cyber threat intelligence (CTI) helps you bolster defenses, hunt down adversaries, investigate incidents and make better security decisions. While once considered a “nice to have”, Cyber Threat Intelligence (CTI) is now widely considered an essential weapon against breaches. A recent study by Enterprise Strategy Group (ESG) found that 72 percent of organizations plan to increase CTI spending — further validation of its important role in your security strategy. Yet, because threat intelligence comes in many shapes and forms, it is often misunderstood. This white paper, “Threat Intelligence: Cybersecurity’s Best Kept Secret,” offers in-depth coverage of CTI, including the different categories of threat intelligence and use cases that demonstrate CTI’s effectiveness in thwarting today’s most dangerous and sophisticated attackers. You’ll also learn how the right CTI can empower better security and executive decisions, while dramatically improving your organization's security post
Tags : 
    
CrowdStrike
Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee
Published By: Qualys     Published Date: Nov 05, 2013
The SANS 20 Critical Security Controls are known for driving effective security programs across government agencies, establishing guidelines for security professionals to ensure the confidentiality, integrity and availability of information technology assets. This paper describes how automating these controls using QualysGuard can protect your organization with continuous security while drastically lowering costs.
Tags : 
automation, cyber security, critical controls, malware defense, application software security, data recovery, compliance applications, qualysguard
    
Qualys
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance
Published By: Qualys     Published Date: Aug 08, 2014
An Introduction to Defending Your Business Against Today’s Most Common Cyber Attacks
Tags : 
cyber attacks, defense, web application, business data, application security
    
Qualys
Published By: CarbonBlack     Published Date: Mar 16, 2016
Today’s cyber-attacks have changed in sophistication, in focus, and in their potential impact on your business. This eBook will outline the tactics today’s advanced attackers are using to break into your organization and why you require a defense-in-depth cyber security program that incorporates automatic detection and incident response.
Tags : 
carbon black, cyber attacks, cyber security, attacks, security, advanced attacks, detection
    
CarbonBlack
Published By: Symantec     Published Date: Sep 14, 2015
In the running battle with cyberthreats, your first line of defense is your IT staff: the system and network administrators, SOC and NOC operators, incident response and forensics analysts, and application development and QA teams. Are these IT professionals ready to take on an ever-growing army of innovative, persistent cybercriminals and hackers? Probably not, if you expect them to acquire the knowledge and skills they need through self-directed study and on-the-job training. There is too much to learn, and few members of the IT staff have the time to research every new threat. And you can’t afford to suffer through APTs, breaches and data leakages just to provide “teachable moments” for IT personnel. There is another solution. Security simulation immerses IT professionals in a realistic online environment and challenges them to fill the roles of cyberattackers and cyberdefenders. It borrows from education theory and online gaming to present knowledge in ways that motivate learning a
Tags : 
on-the-job training, it professionals, cyber security services, security programs
    
Symantec
Published By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : 
ibm, cloud, mobility, social business, data, big dta, theft, cyber theft
    
IBM
Published By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 19, 2016
Cisco AMP for Endpoints is a cloud-managed endpoint security solution that provides the visibility, context and control to not only prevent cyberattacks, but also rapidly detect, contain, and remediate advanced threats if they evade front-line defenses and get inside—all cost-effectively, without affecting operational efficiency, and before damage can be done.
Tags : 
    
Cisco
Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
Artificial intelligence (AI) has become the buzzword du jour for endpoint protection platform (EPP) vendors struggling to remain relevant in a rapidly changing threat landscape. Why does one EPP prevent breaches while another only facilitates incident response? BlackBerry Cylance’s new eBook cuts through the noise with a concise analysis of AI’s role in cyber defense and the four key criteria for evaluating EPP investments. Read the BlackBerry Cylance eBook to learn more.
Tags : 
    
BlackBerry Cylance
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn how web applications and mobile devices impact IT’s ability to successfully defend against cyberthreats, and find out why SDN may be the solution.
Tags : 
citrix, cyberthreat, report, defense
    
Citrix Systems, Inc.
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Take a deep dive into survey data and findings, learn about the evolution of cyberthreats, and find out how you can prepare for cyberattacks in 2015.
Tags : 
citrix, cyberthreat defense, report, 2015
    
Citrix Systems, Inc.
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Get an overview of the cyberthreat landscape and see key findings from the “2015 Cyberthreat Defense Report.”
Tags : 
citrix, cyberthreat, infographic, 2015 report
    
Citrix Systems, Inc.
Start   Previous    1 2 3 4 5    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.