attack

Results 301 - 325 of 1367Sort Results By: Published Date | Title | Company Name
Published By: Splunk     Published Date: Aug 21, 2018
While the modern enterprise embraces digital technology, it is also at risk of cyberattacks. In this guide, “The Essential Guide to Security”, we map out how organizations can use machine data for specific use cases and get started addressing threats and security challenges. Download your complimentary copy to learn: *How to assess your organization’s security maturity *What specific threats you should be looking for and how to fight them *What data sources are needed for specific use cases *What software solution you need to get ahead of different threats
Tags : 
    
Splunk
Published By: Lenovo - APAC     Published Date: Jul 08, 2019
Don’t lose unnecessary time coping with attacks, threats and theft. Lenovo ThinkShield is a comprehensive security portfolio that brings you end-to-end protection. In your solutions guide, you’ll find out the benefits of ThinkShield, how to ensure your data stays secure, how to keep employees stay safe online and some important statistics on the rise of cyber attacks. It’s time to act before your next attack, read the guide to find out what to do next. Read the guide
Tags : 
    
Lenovo - APAC
Published By: Gigamon     Published Date: Dec 13, 2018
Upgrading your network doesn’t have to be a big headache. Get the Securosis report Scaling Network Security and scale security controls and policy without starting over. Discover your options for improving security architecture on your terms, using existing infrastructure and intelligently applying security controls at scale without major overhauls. With this approach, your network protection can evolve with applications, attackers and technology—even in today’s demanding 100Gbps network environment.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 21, 2019
In spite of increasing cybersecurity budgets, organizations are dealing with a worsening skills shortage, obstacles to threat hunting, and ongoing cyberattacks. Download the “2019 Cyberthreat Defense Report” now to learn how IT security pros plan to address these challenges. You’ll learn how to deal with inevitable cyberattacks, eliminate network blind spots and increase the signal-to-noise ratio. Learn more about how IT security pros perceive cyberthreats and plan to defend against them. Download now!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 21, 2019
Organisations have invested heavily in cybersecurity tools and yet more than five million data records are lost or stolen every day. The problem is not that today’s cybersecurity tools are badly designed or missing features, the problem is that surging volumes of network traffic overwhelm security tools, causing administrators to use sampling or disable advanced features in order to preserve application performance. Also, security tools and IT staff don’t get all the data they need to detect and respond to outside attacks and insider incidents, because they are faced with “blind spots” in data collection. Read this business brief in local language to find out how
Tags : 
    
Gigamon
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Digital innovation has changed everything: the money is everywhere, so every business is a potential target for fraud. Banks and financial institutions used to be the primary targets of fraud. Why banks? To quote the notorious American bank robber Willie Sutton, “because that’s where the money is.” While banks remain firmly in the crosshairs of fraudsters, the avalanche of digital business innovation has changed everything. Since the money is everywhere, every business is a potential target for fraud. The same technology that helps us find airfare deals, sweet concert seats, or the best prices on the hottest Jordan shoes– that is, bots–can now be used by criminals. Fraudsters employ automated, faceless bots that scour business apps looking for any opportunity to profit. And since fraud targets business-process weaknesses and not just software vulnerabilities, you may not even know when it is happening.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Gigamon     Published Date: Apr 10, 2019
In spite of increasing cybersecurity budgets, organizations are dealing with a worsening skills shortage, obstacles to threat hunting, and ongoing cyberattacks. Download the “2019 Cyberthreat Defense Report” now to learn how IT security pros plan to address these challenges. You’ll learn how to deal with inevitable cyberattacks, eliminate network blind spots and increase the signal-to-noise ratio. Learn more about how IT security pros perceive cyberthreats and plan to defend against them. Download now!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Apr 10, 2019
Upgrading your network doesn’t have to be a big headache. Get the Securosis report Scaling Network Security and scale security controls and policy without starting over. Discover your options for improving security architecture on your terms, using existing infrastructure and intelligently applying security controls at scale without major overhauls. With this approach, your network protection can evolve with applications, attackers and technology—even in today’s demanding 100Gbps network environment.
Tags : 
    
Gigamon
Published By: Rackspace     Published Date: May 15, 2019
The guide to how SQL Server 2008 end-of-service can drive IT modernization. End-of-service presents serious risks to your organisation if you don’t deal with it correctly—or worse—if you don’t deal with it at all, including the loss of access to critical security updates and Microsoft hotfixes. Also, if you don’t take action, your organisation will be exposed to potential disruption from hackers and malware. That means valuable customer data could be exposed to attack, risking monetary and reputational damage. And from a regulatory standpoint, there could be compliance issues with rules such as HIPAA, PCI, and GDPR. On the other hand, if you take well-considered action that aligns with your long-term strategy, end-of-service is also an opportunity for data estate modernisation. In this e-book, we’ll discuss how migration to Azure as part of your fix for SQL Server 2008 end-of-service solves for all these, and opens doors for the future of your data-driven business.
Tags : 
    
Rackspace
Published By: Barracuda     Published Date: May 29, 2019
Spear phishing is a threat that’s constantly evolving as cybercriminals find new ways to avoid detection. This report takes an in-depth look at the three most prevalent types of attacks: brand impersonation, business email compromise, and blackmail.
Tags : 
    
Barracuda
Published By: Barracuda     Published Date: May 30, 2019
Use a multi-layered protection strategy to defend your business, data and people
Tags : 
    
Barracuda
Published By: Barracuda     Published Date: Jun 18, 2019
Use a multi-layered protection strategy to defend your business, data and people
Tags : 
    
Barracuda
Published By: McAfee APAC     Published Date: Jun 25, 2019
Business is accelerating with technology. Technology is expanding the cyberattack surface. In today’s survival of the fittest landscape, here are five ways to not just survive, but thrive with a layered and integrated defense that protects your entire digital terrain and all types of devices.
Tags : 
    
McAfee APAC
Published By: IBM APAC     Published Date: Mar 06, 2019
The 2019 IBM X-Force Threat Intelligence Index looks back at the threats, tactics, and trends that emerged in 2018 based on insights from IBM X-Force Security Research Team. Deriving data and insights from security clients, incident response services and penetration testing engagements, the IBM X-Force Threat Intelligence Index 2019 report outlines the most prominent threats and provides key insights into various industries, attack tactics, and major vulnerabilities that emerged during the year.
Tags : 
    
IBM APAC
Published By: Cisco     Published Date: Jan 17, 2018
As the region is poised to take its position amongst the world’s top digital economies, the doors are wide open for cyberattacks. A radical agenda can help policy makers and industry leaders defend and capture a wealth of value.
Tags : 
    
Cisco
Published By: Oracle     Published Date: Nov 30, 2017
The DNS is an often-overlooked protocol. Historically, many companies believed they could either run their own DNS service in-house or simply use a bundled option provided by their hosting or CDN provider. However, with the rise in DDoS attacks and continued migration to the cloud, the mission-critical nature of the DNS has become quite apparent to companies around the world. As a result, many are searching for a managed DNS provider.
Tags : 
dns, email delivery, global ip, network, connectivity, isp, service provider
    
Oracle
Published By: Oracle     Published Date: Nov 30, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : 
dns, provider, global, anycast, network, customer, pop, business
    
Oracle
Published By: Oracle Dyn     Published Date: Dec 06, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : 
dns, provider, global, anycast, network, customer, pop, business
    
Oracle Dyn
Published By: Oracle Dyn     Published Date: Dec 06, 2017
The DNS is an often-overlooked protocol. Historically, many companies believed they could either run their own DNS service in-house or simply use a bundled option provided by their hosting or CDN provider. However, with the rise in DDoS attacks and continued migration to the cloud, the mission-critical nature of the DNS has become quite apparent to companies around the world. As a result, many are searching for a managed DNS provider.
Tags : 
dns, vendors, dns, ddos, attack, cyber security
    
Oracle Dyn
Published By: McAfee     Published Date: Feb 17, 2014
Discover how Advanced Evasions will break the security protection model being used by most organisations and learn how to better protect your business against these attacks.
Tags : 
cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spyware, anti virus, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention
    
McAfee
Published By: McAfee     Published Date: Feb 17, 2014
Discover the requirements of a Next Generation Firewall (NGFW) and what capabilities are required in order to protect against the ever evolving threat.
Tags : 
cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spam, anti spyware, anti virus, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, network security appliance
    
McAfee
Published By: McAfee     Published Date: Feb 17, 2014
Learn about the weak points in current network security devices and disover the solution in protecting against against advanced hacking methods
Tags : 
cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spyware, anti virus, application security, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, network security appliance, security management, vulnerability management
    
McAfee
Published By: Sophos     Published Date: Oct 14, 2015
This whitepaper aims to dispel the fear and confusion surrounding encryption. It demonstrates how organizations can move forward with an encryption strategy in a manner that is simple, practical and achievable. So let’s start by setting the record straight on a few myths.
Tags : 
guide to encryption, data breaches, cyber attacks, myths of encryption, security, wireless security
    
Sophos
Published By: Hitachi Vantara     Published Date: Mar 20, 2018
Digital transformation is disrupting traditional, tried-and-true business process and leaving many enterprises scrambling for alternatives. Although the customer remains king for business success, data is quickly becoming an organization’s most strategic asset for reaching, interacting with and retaining customers. With ransomware attacks on the rise, a strict regulatory environment, and nimble, competitive upstarts entering the market, protecting and extracting value from your most strategic asset is a business imperative — and a formidable challenge.
Tags : 
    
Hitachi Vantara
Published By: Arbor     Published Date: Sep 15, 2014
This Frost and Sullivan market research study comes at a time when DDoS attacks are accelerating in size, frequency and complexity. Though DDoS is not a new concern, the risk of DDoS attacks and the potential for damage is at an all-time high. As a result, DDoS mitigation is a top-of-mind consideration for IT and security organizations around the world, and demand for DDoS mitigation solutions is growing rapidly.
Tags : 
ddos attacks, it security, ddos mitigation, security, it management, business analytics
    
Arbor
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.