Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

data breach

Results 326 - 350 of 356Sort Results By: Published Date | Title | Company Name
Published By: Idera     Published Date: Jan 22, 2013
STOLEN DATA LIVES ON; LOST DATA IS LOST FOREVER.
Tags : 
idera, data breaches, 2012, lost data, sony data thefts of 2011, data thefts, sony online entertainment, play station network
    
Idera
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance, complaint, data, breach, remediation, dss, payment, card, industry, data, security, standards, qsa
    
Dell Storage
Published By: Courion     Published Date: Aug 21, 2012
Hear from a panel of experts as they discuss the factors that impact enterprise security strategy, including regulatory pressures, demands from audit to demonstrate compliance, the increasing risk of data breaches.
Tags : 
access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance, access policy, user provisioning, access certification, access intelligence, user access, onboarding, data management, data center
    
Courion
Published By: Arbor Networks     Published Date: Mar 06, 2013
This Frost & Sullivan white paper identifies what organizations need to know to protect their intellectual property and prepare for unexpected data breaches.
Tags : 
cyber threats, security, ddos, data breaches, atlas, frost & sullivan, cloud, hosting, cloud computing, network, access control, anti spam, anti spyware, anti virus, application security, auditing, business continuity, disaster recovery, email security, encryption
    
Arbor Networks
Published By: NETIQ     Published Date: Mar 12, 2013
NetIQ’s Identity, Access and Security Management solutions integrate seamlessly to help you control access to cloud services and data, reduce your risk of data breaches in mixed environments.
Tags : 
security and compliance in the cloud
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
File integrity monitoring facilitates the detection of attacks by cybercriminals and insider threats that may result in costly data breaches. It is a critical component of Payment Card Industry Data Security Standard (PCI DSS).
Tags : 
data security, compliance, pci dss, file integrity monitoring, fim, corporate compliance security
    
NETIQ
Published By: SafeNet     Published Date: Jun 03, 2013
To learn more about the current state of the data braech epidemic and how to implement a strategy to prevent it, read SafeNet's Secure Breach Manifesto.
Tags : 
data breach, it security, data security, data protection
    
SafeNet
Published By: Oracle     Published Date: May 07, 2018
2017 was a momentous year in security, even though the DDoS landscape appeared to plateau. Maybe it was because Mirai hit so hard at the end of 2016 and the owners of other botnets were retooling to catch up. Maybe it was because news of large data breaches captured so many headlines, drawing the attention of both criminals and the public. Or maybe it is simply due to the cyclical nature of attack popularity that we have seen in the past. No matter the cause, our prediction is that the trend won’t continue in 2018, and it is not time to be complacent. The Mirai botnet is far from played out, as botnet creators are continuing to modify the source code for their individual needs and, with more connected platforms devices than ever, the Internet will continue to offer fertile ground for largescale attacks.
Tags : 
internet, security, cryptocurrency, data, breaches, botnet
    
Oracle
Published By: Symantec     Published Date: Oct 07, 2014
With the rapid rise in data breaches, advanced threats and mobility, data loss prevention (DLP) has quickly evolved from a security issue to a business imperative. This research paper examines the findings from a new study on DLP by Symantec. The goal of the study is to understand how DLP programs impact the effectiveness of security executives, while also protecting corporate data.
Tags : 
data loss prevention, data breaches, threats and mobility, security executives, corporate data, security
    
Symantec
Published By: Varonis     Published Date: Nov 12, 2013
Verizon’s longstanding Data Breach Investigations Report1, or DBIR, is an excellent starting point to understand the larger trends in security and data protection.
Tags : 
varonis, medical insurer, mortgage lender, retailer, data breach investigations report, dbir, larger trends, security, data protection, global scale, breach activity, validated breach incidents, collect personal details, hackers, breach statistics, security decisions, exposed data, it deficiencies, access control, web service security
    
Varonis
Published By: Varonis     Published Date: Nov 12, 2013
Odds are fairly high that there is sensitive data on your corporate network that is overexposed and itching to escape. But will it ?Forrester thinks so – in a recent survey, 22% of security decision makers reported a data breach in the past twelve months, and at an average cost of $7.2 million per breach, it’s no shock that organizations are constantly working to strengthen their defenses.
Tags : 
varonis, data protection, context awareness, inevitable breach, sensitive data, corporate network, security decision-makers, data breach, it professionals, security professionals, leaked critical data, endpoint protections, network protections, server protections, dlp solutions, metadata, it management
    
Varonis
Published By: Lumension     Published Date: Jun 03, 2015
The IT news over the last year has been filled with story after story on data breaches, making the release of Lumensions’ 4th annual data protection maturity report all the more relevant. Review this report for a timely analysis of the threats, responses, policies, and technologies comprising today’s shifting data security landscape. It also reveals how organizations have made progress, the steps they plan to take to address data protection challenges in 2015—and where they may still be at risk.
Tags : 
data protection, data, security, cloud, storage, infrastructure, business intelligence, database development, database security, productivity
    
Lumension
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services. This paper explains that employees may not be aware that their file transfer methods can cause a risk to security. Ways to ensure that employees can securely send files without risking corporate data security and what that dangers are with BYOD transfers are also discussed. Recent security breaches are referenced in the paper, and why such attacks are expected to continue into the future. The paper concludes with a description of how companies can ensure data security and how Globalscape's secure file transfer products meet and exceed that need.
Tags : 
byod, dropbox, google drive, file transfer, file sharing, mft, mobile security, data protection, internet security, network security, data security, eft, mail express, security, it management, data management, content management system, document management, information management, secure content management
    
Globalscape
Published By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common PCI DSS compliance challenges, questions to ask as you plan and prepare, core capabilities needed to demonstrate compliance, and how to simplify compliance with a unified approach to security
Tags : 
pci, dss, compliance, alienvault, security management, vulnerability management, cyberattacks, data breach prevention, security intelligence, behavioral monitoring, asset discovery, threat detection, anti virus, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, pci compliance
    
AlienVault
Published By: Intel Security     Published Date: Oct 20, 2015
This in-depth report provides a detailed look at a recent survey carried out by Intel Security exploring the topic of data exfiltration. Participants were asked about their top concerns, breach and exfiltration details, outsider and insider threats, exfiltration differences between traditional networks and cloud applications, and the tools and practices they use to identify and prevent data exfiltration.
Tags : 
data exfiltration, data loss prevention, dlp, data management
    
Intel Security
Published By: Mimecast     Published Date: Jun 24, 2015
The article is a helpful reminder that your employees often make life easier for attackers by being the weakest link in your network defenses. Social media is a rich hunting ground for hackers. Names, locations, photos, interests, connections, partnerships, vacation details, email addresses and phone numbers – this is often the information that hackers use to target specific employees through well-crafted, highly personalized emails.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management, knowledge management, data management
    
Mimecast
Published By: Mimecast     Published Date: Jun 25, 2015
In this whitepaper, Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization, see exactly what happens before, during and after an attack, all the mistakes that made you vulnerable, and how you can get ready for it.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management, knowledge management, data management
    
Mimecast
Published By: BitSight Technologies     Published Date: Jan 11, 2016
As third party data breaches have increased in recent years, regulators and organizations have moved from relying solely on static questionnaires and assessments, to continuously monitoring the security of vendors. Learn how financial institutions have adopted a continuous monitoring approach for their vendor risk management programs.
Tags : 
networking, security, it management, knowledge management, data management, it career advancement, data center
    
BitSight Technologies
Published By: VMware AirWatch     Published Date: May 19, 2016
In the cacophony of business headlines, news of data security breaches come through like a high-tempo drum beat. In fact, the number of incidents keeps growing at a rate of 66 percent CAGR, with a cost per breach of $5.9 million. And some of the world’s most recognized brands are sustaining bruises to their reputations and harmful hits to their bottom lines as they scramble to repair the damages. Enterprise IT organizations are facing an elusive enemy perpetrators who range from sophisticated cyber criminals and government-sponsored spies to hackers and script kiddies, and who have motives as diverse as money, politics, or simply youthful mischief.
Tags : 
data security, enterprise, data protection, mobile security, anti spyware, access control, application security, hacker detection, identity management, network security appliance, security management
    
VMware AirWatch
Published By: IBM     Published Date: Oct 02, 2015
2015 Global Cost of Data Breach Study. The gold standard benchmark from Ponemon Institute and IBM.
Tags : 
    
IBM
Published By: LogRhythm     Published Date: Jun 19, 2018
Globally, sophisticated cyber-attacks are compromising organizations at an unprecedented rate and with devastating consequences. Modern attackers, including criminal organizations, ideological groups, nation states and other advanced threat actors are motivated by a wide range of objectives that include financial gain, industrial espionage, cyber-warfare, and terrorism. These attacks are often very expensive for compromised organizations, costing each company an average of USD $7.7M.1 1 Ponemon 2015 Cost of Cyber Crime Study 2 CyberEdge 2016 Cyberthreat Defense Report 3 Symantec, Underground black market: Thriving trade in stolen data, malware, and attack service. November 20, 2015; Medscape, Stolen EHR Charts Sell for $50 Each on Black Market, April 28, 2014 4 Deloitte, Beneath the Surface of a Cyberattack, 2016 The Modern Cyber Threat Pandemic 3 The odds that your organization will be compromised are high. In fact, a recent report indicates that 76 percent of surveyed organizatio
Tags : 
data, breaches, organizations, global
    
LogRhythm
Published By: CA Technologies     Published Date: Jun 01, 2018
Within any organization, the most dangerous users are those with privileged access to the company’s most valuable and sensitive data assets. This includes systems administrators, business managers, partners, suppliers, and service providers, and also takes into account the automated interactions between business machines, systems, and applications. Privileged access has always been a high-risk issue, but for too long, organizations have not understood or have chosen to ignore the risks, preferring instead to rely on the integrity of the individuals and systems involved. A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solution
Tags : 
    
CA Technologies
Published By: Cox Business     Published Date: Dec 19, 2016
As we continue to move forward into an age of big data, optimization, and shared information through the capabilities of better networking technologies, opportunities have never been greater for using technology to improve the way the government interacts with constituents. However, increasing dependence on web and network services also makes government a tempting target for hackers. Distributed Denial of Service attacks, data breaches, leaks, the risks can be enormous. Recent events have shown us that now more than ever, government servers are getting victimized by well-funded teams of foreign hackers, possibly funded by their government.
Tags : 
    
Cox Business
Published By: CrowdStrike     Published Date: Feb 01, 2017
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. Download the white paper to learn: • How to detect known and unknown threats by applying high-volume graph-based technology, similar to the ones developed by Facebook and Google • How CrowdStrike solved this challenge by building its own proprietary graph data model • How CrowdStrike Threat Graph™ collects and analyzes massive volumes of security-related data to stop breaches
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Aug 01, 2017
The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.Download the white paper to:?Learn how a proactive hunting strategy protects valuable data assets from a potential mega breach?Get a detailed analysis of how highly skilled human hunters pair with technology to aggressively seek out threat behaviors?Understand why integrating CrowdStrike Falcon Overwatch into an organization’s existing security resources offers the most comprehensive protection against persistent and skilled adversaries?Fi
Tags : 
    
CrowdStrike
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search