hack

Results 1 - 25 of 342Sort Results By: Published Date | Title | Company Name
Published By: Dell SB     Published Date: Aug 27, 2019
Viele Kleinunternehmer glauben, dass ihre Unternehmen aufgrund der Größe kein Ziel von Hacks, Ransomware und anderen Arten von Cyberangriffen werden. Andere sind sich der Notwendigkeit von Cybersicherheit bewusst, sind aber der Meinung, nicht über genügend Ressourcen zu verfügen, um Cybersicherheit zur Priorität zu machen. Dies sind nur einige der Gründe, weshalb ganze 90 % aller Kleinunternehmen keine Sicherheitsvorkehrungen treffen, die die Daten des Unternehmens und der Kunden schützen könnten.
Tags : 
    
Dell SB
Published By: Entrust Datacard     Published Date: Jul 23, 2019
In years past, device functionality was enough to sell most embedded products without much concern for cybersecurity. Of course there were exceptions, such as in critical infrastructure, aviation, and military, for which security was always of importance. But today’s environment has evolved on several fronts. First, organizations across nearly all markets are demanding Internet connectivity to monitor and control devices as well as to aggregate and analyze data. Second, the magnitude of security threats has exploded, driven by highly sophisticated hackers including organized criminal gangs seeking financial returns, creating a constantly evolving threat landscape. Third, the increasingly complex nature of connected systems makes them ever more challenging to protect. The more complex a system, the more potential vulnerabilities it may contain. And fourth, the data generated by connected devices represent an asset that is becoming increasingly valuable for organizations to derive insigh
Tags : 
    
Entrust Datacard
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
You are doing everything you can to avoid breaches. But what happens when a hacker manages to bypass your security? In this webinar we will show you how to build a strong security posture and a layered defence that will give you the ability to quickly respond to breaches. We will cover: - The evolving threat landscape and why prevention-only strategies eventually fail - How to build a strong first line of defence to reduce exposure to threats - Protect your last line of defence with retrospective security - A quick demo of how Cisco Umbrella and AMP for Endpoints work together to contain, detect and remediate threats in real time - An overview of how Incident Response Services can help you with the skills you need to manage a breach
Tags : 
    
Cisco Umbrella EMEA
Published By: Jamf     Published Date: Aug 12, 2019
A well-planned cyberattack or an accidental download of malware can mean the difference between a productive day and all work grinding to a halt. As hackers get more sophisticated, organizations concerned about their bottom line and security of their customer, employee or student data must stay on top of security.
Tags : 
    
Jamf
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities
    
Ounce Labs, an IBM Company
Published By: QTS     Published Date: Nov 04, 2016
Watch this video to hear from American Hacker, Jeff Moss, about the security threats faced by companies today!
Tags : 
information security, security threats, data security
    
QTS
Published By: SolarWinds MSP     Published Date: Jan 25, 2017
Download the e-book "7 Ways to Make Yourself Hard to Hack" and read up on some great guidelines to follow as you build a layered approach to security.
Tags : 
solarwinds, msp, hackers, security, it security
    
SolarWinds MSP
Published By: Coupa     Published Date: Dec 14, 2018
Data from The Hackett Group’s most recent Purchase-to-Pay Performance Study shows that organizations with high levels of AP automation save 43% on invoice processing costs. However, top-performing organizations don’t focus solely on process automation.
Tags : 
    
Coupa
Published By: Coupa     Published Date: Dec 14, 2018
What P2P Leaders Do That You Can, Too Purchase-to-pay (P2P) organizations are under high-stakes stress. With constant changes in market volatility, fierce competition, and disruptive technology, P2P teams need to re-think their approach to balancing traditional cost concerns and emphasize agility. The question is: how? To help companies discover the answer, The Hackett Group looked at P2P organizations across a variety of industries and areas over a 12-month period to identify what top performers had in common—and what set them apart. Read this report to gain insight into three key areas: Ensuring stakeholder needs guide day-to-day decisions Digitizing information to increase availability and agility Automating processes to accelerate response to change
Tags : 
    
Coupa
Published By: Akamai Technologies     Published Date: May 05, 2017
Security and performance were once considered separate issues requiring very different solutions. But now that malicious hackers have discovered new and better ways to affect both aspects of a website, you need solutions that can plug security holes while enhancing frontend performance. How is that possible? In this report, we explore browser-based solutions that can beef up security and enhance end-user performance in one stroke. This report examines several techniques for dealing with third party content issues in the browser, including HSTS, iframe, and prefetch. It also dives into service workers and browser-based scripts that provide many security and performance options. Download it now and learn how you can jointly improve security and increase performance.
Tags : 
cyber security, security, web linking, performance
    
Akamai Technologies
Published By: Freshdesk     Published Date: Aug 15, 2016
When 76% of consumers say they view customer service as the true test of how much a company values them, you have to make sure that your strategy, and tool, are top notch. Here's a collection of best practices, drawn from our conversations with customers, to help you improve your agents' productivity and win customer love. In this whitepaper, we detail how you can - Provide your agents with complete context by pulling data from your third party systems into your helpdesk - Reduce ticket volume and help customers help themselves by setting up a knowledge base - Automatically assign tickets to the right team with ease thus reducing your agent's workload and many more!
Tags : 
    
Freshdesk
Published By: F5 Networks Inc     Published Date: Dec 08, 2017
The world set a new record for data breaches in 2016, with more than 4.2 billion exposed records, shattering the former record of 1.1 billion in 2013. But if 2016 was bad, 2017 is shaping up to be even worse. In the first six months of 2017, there were 2,227 breaches reported, exposing over 6 billion records and putting untold numbers of accounts at risk. Out of all these stolen records, a large majority include usernames and passwords, which are leveraged in 81 percent of hacking-related breaches according to the 2017 Verizon Data Breach Investigations Report. Faced with ever-growing concerns over application and data integrity, organizations must prioritize identity protection in their security strategies. In fact, safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in 2017.
Tags : 
data breach, credential stuffing, system security, security
    
F5 Networks Inc
Published By: Oracle CX     Published Date: Oct 20, 2017
Oracle’s new cloud platform, included a new line of servers for cloud and scale-out applications: Oracle’s SPARC S7-2 and S7-2L servers. These servers are based on the breakthrough SPARC S7 processor and extend the outstanding features and capabilities of the SPARC T7 and M7 systems into scale-out form factors. With the combination of Oracle’s breakthrough Software in Silicon features and the efficiency of the SPARC S7 processor we can offer the most secure and economical enterprise clouds with the fastest infrastructure for data analytics. Here at Oracle we recognize our customers’ needs for increasing the security of their data, therefore we have taken security as one of the core values on the SPARC Servers. The new SPARC S7 processor leverages the revolutionary Security in Silicon features introduced on the SPARC T7 and M7 systems. Silicon Secured Memory is a unique hardware implementation that prevents unauthorized access to application data in memory and can prevent hacking explo
Tags : 
    
Oracle CX
Published By: Infosys     Published Date: May 30, 2018
In the wake of data hacks and privacy concerns, enterprises are working extra hard to make sure they secure customer data from external threats. But what about securing data internally? Organizations unknowingly leave a big security hole in their own systems when they fail to have structured internal processes to handle access requests for employees, which could have disastrous implications for data security. A leading US bank sought to move its internal applications to a secure system for a standard and consistent access rights experience. See how Infosys helped and the five key takeaways from the project.
Tags : 
internal, applications, data, hacks, privacy, enterprises
    
Infosys
Published By: Workday France     Published Date: Aug 14, 2019
Alors que l'horizon économique demeure incertain, les DAF se tournent vers la technologie pour appuyer leurs décisions. Une étude récente de Hackett Group menée auprès de responsables financiers permet de distinguer 5 tendances digitales principales pour réduire les coûts et améliorer l'efficacité, notamment : • De meilleures analyses • Un back-office plus fiable • De nouvelles initiatives à valeur ajoutée • Découvrez comment la technologie peut mener votre entreprise sur la voie de la réussite en 2019.
Tags : 
workday, finance, tendance, digital transformation, hackett group, horizon économique
    
Workday France
Published By: SAP Ariba     Published Date: Oct 11, 2018
Procurement organizations are moving in substantial numbers to implement integrated technology suites in areas like source-to-contract and purchase-to-pay. A new generation of technology has made it possible for these technologies to move to the cloud, simplifying maintenance and administration. A recent Hackett Group study analyzed the use of e-sourcing suites to uncover trends, benefits and drawbacks to unifying these processes in one solution. For organizations already invested in optimizing sourcing execution efforts, the arguments for moving to an integrated suite are compelling.
Tags : 
    
SAP Ariba
Published By: Limelight Network     Published Date: Aug 12, 2019
Cyber-criminals are increasingly sophisticated and targeted in their attacks. If you are in charge of ensuring the security of your company’s website, it has not been easy going as these notable security incidents reveal: • Sabre Systems—The reservation software company had data from Hard Rock Hotels, Google, Loews, and others, stolen as a result of the breach1. • CIA—WikiLeaks obtained and published documents detailing the intelligence agency’s hacking efforts1. • Virgin America—Thousands of employees and contractors had their login information compromised1. • Equifax—The credit rating agency had a breach into highly sensitive personal information of 143 million U.S. consumers1. • Universities and Federal Agencies—More than 60 universities and US federal organizations were compromised with SQL injections1. There are numerous lessons to be learned from these breaches. Despite the growing stream of news stories about highly damaging attacks that compromise customer info
Tags : 
    
Limelight Network
Published By: Dell     Published Date: May 07, 2015
Protect against hackers by upgrading to new desktops featuring Intel’s hardware-enhanced security and supporting software. Innovative hardware enhancements, built into Intel®-powered desktops since mid-2013, “harden” key information and commands normally executed in software, giving your business maximum protection. Read this paper to learn what your organization can do to overcome security challenges.
Tags : 
    
Dell
Published By: Cisco     Published Date: Oct 08, 2015
The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming ever-weaker links in the security chain.
Tags : 
security, cisco, hacking, malware, attackers, security report
    
Cisco
Published By: Cisco     Published Date: Oct 08, 2015
This paper outlines and explains the 5 steps to help defend your network from infection, hacking and hard to detect threats.
Tags : 
network defense, hacking, detecting threats
    
Cisco
Published By: join.me     Published Date: Jan 06, 2015
This White Paper provides information on how to avoid technology frustrations that sap productivity.
Tags : 
online meetings, business online meetings, how to improve online meetings, online conferences
    
join.me
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
From stolen consumer data to sensitive data leaks, it seems that no one’s data has been safe in recent years. For numerous reasons, like misconfigured storage repositories and unpatched vulnerabilities, this trend is likely to continue. The integration of digital technology into all areas of business has resulted in more of our data being stored on computers and websites targeted by hackers, which has significantly increased the number of data breaches as well as organizations’ vulnerability to malware attacks. For example, the Equifax breach impacted 145 MM consumers, and with more employees working remotely on a wide range of devices, the threat landscape has expanded. The meteoric rise of the public cloud has compounded this issue, as data security requires new knowledge and skill sets in short supply, often leading to misconfigured and insecure solutions. Companies need to adopt the approach that every piece of data in their possession, on-premises or in the cloud, must be encryp
Tags : 
encryption, data, key, cloud, bits, keys, ciphertext, entropy
    
Rubrik EMEA
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
From the Era Before security to this current era of empowerment this infographic from BlueCoat provides a timeline navigates the rise of web commerce and the rise in securities which protect us. Starting with when web commerce began to grow and hackers took notice to now when Web Security is able to empower businesses.
Tags : 
idc, security, bluecoat, web security, hackers
    
Blue Coat Systems
Published By: Secureworks     Published Date: Nov 11, 2016
This paper takes an in-depth look at the true costs — both short and long term — of a data breach, and provides steps and tips that executive teams and security leaders can use to determine and reduce the true cost of a data breach.
Tags : 
managed security services, data breach, security, hackers, security, threat and vulnerability management, cost
    
Secureworks
Published By: Oracle Linux     Published Date: Oct 24, 2018
Security is everyone’s job today, from consumers, to system administrators, to executives. If you are doing business, you need to elevate the priority of security across your organization and data center. Over the years, cybercriminals have gotten more advanced and better funded. They are entire teams of highly trained hackers, and they have built it into a very profitable business. Cybercrime is big business. In many cases, states have built their own cyberattack teams. These teams are no less important to their state strategies than their army or navy. And just like these cyber-attack teams are prepared to attack anyone, you too must be prepared to defend against anyone. Whether you know it or not, you are in a cyber war. You need to be prepared.
Tags : 
    
Oracle Linux
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.