> Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 1217Sort Results By: Published Date | Title | Company Name
By: AlienVault     Published Date: Jul 16, 2014
“AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable AV Labs and Open Threat Exchange.” In this analyst report, Javvad Malik of The 451 Group, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.
Tags : alienvault, alienvault usm, security operations center, smb, javvad malik
     AlienVault
By: Neustar     Published Date: Jul 14, 2014
More and more criminals are using DDoS attacks as a distraction or “smokescreen” for other cybercrimes like theft of data or even funds. Watch this video for a behind-the-scenes tour of what this “underground economy” of the Internet really looks like – a place where criminals sell stolen credit cards and credentials by the thousands, offer botnets, malware, and DDoS for hire, and much more
Tags : neustar, ddos, cybercrimes, malware, botnets
     Neustar
By: Neustar     Published Date: Jul 14, 2014
For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger? What new tactics are criminals employing? See this infographic for clues.
Tags : neustar, blackbeard, pirate, siteprotect, cloud computing
     Neustar
By: Neustar     Published Date: Jul 14, 2014
It’s no secret that DDoS attacks are worsening by the day. From the largest financial institutions to smaller Internet companies, everyone’s a target. Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size. Most of these conversations boil down to three key questions and form the conversation you should be having, too—whether you use Neustar, another provider or your in-house team to manage your external DNS.
Tags : neustar, ddos, ecommerce, protection, security
     Neustar
By: Neustar     Published Date: Jul 14, 2014
DDoS attacks against high-tech firms have started to take a dangerous turn. It’s called DDoS smokescreening — attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar’s 2014 Annual DDoS Attacks and Impact Survey. The resulting report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as software, SaaS, IaaS as well as hardware manufacturers
Tags : neustar, ddos, online gaming, ecommerce, protection
     Neustar
By: AlienVault     Published Date: Jul 14, 2014
While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.
Tags : alienvault, threat intelligence, vulnerability assessments, vulnerability data, security
     AlienVault
By: AlienVault     Published Date: Jul 14, 2014
Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.
Tags : alienvault, troubleshooting operational errors, potential security exposures, satisfy compliance requirements, security
     AlienVault
By: AlienVault     Published Date: Jul 14, 2014
Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources. In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.
Tags : alienvault, limited resources, it time management, it prioritization, it management
     AlienVault
By: IBM     Published Date: Jul 09, 2014
Most organizations are managing data sets that are larger than ever before, where many security offenses can be hidden and undetected, posing severe risks to business operations and the protection of sensitive, private information. Watch this video and learn how these exposures can be addressed with IBM's integrated Security Intelligence and Big Data solution.
Tags : ibm, security, cyber security, security intelligence, big data
     IBM
By: IBM     Published Date: Jul 09, 2014
As new threats emerge every day, the need for qualified security staff is growing. But there aren’t enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security leaders said that staffing issues contribute to heightened levels of risk.
Tags : ibm, security, technical security, forrester report, it security
     IBM
By: VSS Monitoring     Published Date: Jul 09, 2014
A full-service personal bank has provided award winning financial services to its customers for over fifty years. As one of the oldest independently owned and managed banks in the region, it takes great pride in offering superior customer service and support. Its networks support daily operations for over 19 local offices and hundreds of thousands of customer accounts. Download to learn more!
Tags : vss monitoring, financial services provider, security, roi, banking
     VSS Monitoring
By: VSS Monitoring     Published Date: Jul 09, 2014
In an environment where a millisecond can cost a million dollars, the monitoring infrastructure must capture 100 percent of the traffic, regardless of its characteristics. The world of high-frequency trading (HFT) and algorithmic trading places high demands on the network infrastructure with no tolerance for packet latency or loss. Download to learn more!
Tags : vss monitoring, network monitoring, security, threats, cyber terrorists
     VSS Monitoring
By: Network Instruments     Published Date: Jun 30, 2014
News of recent credit card hacks has rocked consumer confidence. Even talk of a security breach can bring on a PR firestorm. What can you do to make sure your customers and clients are protected? The 12 Payment Card Industry (PCI) Data Security Standard (DSS) requirements along with the right Application Performance Monitoring (APM) solution can help keep you one step ahead of the hackers.
Tags : network instruments, hacks, apm, security, pci
     Network Instruments
By: Delphix     Published Date: Jun 27, 2014
Most data masking products can create masked data copies but not distribute or update them, resulting in projects that fail to live up to expectations. Learn why Delphix’s Agile Masking solution is the only product that solves both masked data creation and delivery challenges.
Tags : data security, masking products, agile masking, solution, creation
     Delphix
By: Cyveillance     Published Date: Jun 20, 2014
Learn about the recent trends and the 2014 outlook for the information security threat landscape. Find out how your organization can better prepare to prevent malicious attacks that could disrupt your business.
Tags : cyveillance, security, attacks, security threats, cybercriminals
     Cyveillance
By: Cyveillance     Published Date: Jun 20, 2014
Learn about the true cost dynamics behind Phishing attacks and see what your organization could do to better prepare against these increasingly complex threats.
Tags : cyveillance, phishing, security, cyberattacks, cybercriminals
     Cyveillance
By: Cyveillance     Published Date: Jun 20, 2014
Learn how cyber criminals are adapting to the newest mobile technologies, and how they have figured out how to create “rogue” applications that leverage a brand’s logo, slogan, or other intellectual property to commit fraud, theft or other crime.
Tags : cyveillance, mobile apps, cyber security, mobile security, cyber criminals
     Cyveillance
By: Cyveillance     Published Date: Jun 20, 2014
Learn about the recent trends and the 2014 outlook for the mobile security threat landscape. Find out how your organization can better prepare to prevent threats that could disrupt your business.
Tags : cyveillance, mobile security, cyberattacks, threats, malicious attacks
     Cyveillance
By: Symantec Corporation     Published Date: Jun 18, 2014
Business owners require flexibility and scalability in their efforts to build trust and protect online sites and transactions from Hackers. Hackers are constantly developing more sophisticated methods to breach security protections and inflict damage on a business or its customers. This paper examines algorithm agility, how it fits into the current and evolving security landscape and how your business can enhance online security through a more flexible, scalable approach to SSL certification.
Tags : symantec, ssl certificates, tco, third party vendors, hidden costs
     Symantec Corporation
By: Symantec Corporation     Published Date: Jun 18, 2014
Compliance is a fast-moving target, and it’s getting harder to keep up. In a survey by IT Policy Compliance Group, a consortium dedicated to helping IT security professionals meet policy and compliance goals, 70 percent of all respondents reported being subject to multiple regulatory compliance mandates, as well as contractual obligations and industry standards. Download to learn how Symantec Certificate Intelligence Center allows enterprises to automate discovery tasks and set up alerts to notify administrators when certificates expire or require maintenance.
Tags : symantec, ssl certificates, tco, third party vendors, hidden costs
     Symantec Corporation
By: Symantec Corporation     Published Date: Jun 18, 2014
This white paper will present the lack of operational efficiencies and compliance pitfalls associated with poor SSL certificate management, why poor management is potentially dangerous to the enterprise, and how the right SSL certificate management tool can help enterprises keep track of and manage SSL certificates more effectively.
Tags : symantec, ssl certificates, tco, third party vendors, hidden costs
     Symantec Corporation
By: Symantec Corporation     Published Date: Jun 18, 2014
This guide provides five simple steps for IT professionals to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates throughout their lifecycle.
Tags : symantec, ssl certificates, tco, third party vendors, hidden costs
     Symantec Corporation
By: Symantec Corporation     Published Date: Jun 18, 2014
This paper explores the true TCO for self-signed SSL certificates, including a side by side comparison of a self-signed architecture versus working with a third-party SSL vendor. Before a company decides to use self-signed certificates, these issues deserve careful consideration.
Tags : symantec, ssl certificates, tco, third party vendors, hidden costs
     Symantec Corporation
By: Symantec Corporation     Published Date: Jun 18, 2014
Web sites now generate more than $7 trillion in worldwide Internet ecommerce. Web applications are used to purchase products, obtain critical information, and enable a host of other key business processes. While using these applications greatly enhances business opportunities, the openness inherent in Web applications exposes companies to threat actors who can access mission-critical back-end databases and garner confidential information. Accordingly, having proper authentication safeguards in place is an essential component of any good Web security strategy. Download to learn how Symantec is mitigating web security with SSL certificates!
Tags : symantec, ssl certificates, tco, third party vendors, hidden costs
     Symantec Corporation
By: Symantec Corporation     Published Date: Jun 18, 2014
Information security professionals who want to want to understand how to protect their systems from Heartbleed vulnerability should read this paper!
Tags : symantec, ssl certificates, tco, third party vendors, hidden costs
     Symantec Corporation
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search