exploit

Results 151 - 175 of 227Sort Results By: Published Date | Title | Company Name
Published By: TIBCO     Published Date: Aug 18, 2014
Digitalization—the process of exploiting digital information to maximize business success—has increased the value of your data to the point where it is arguably your most important asset. This paper explains why mastery will not be possible with merely adequate integration technology.
Tags : 
tibco, integration, data integration, business integration, business intelligence, intelligence, analytics, digitalization, information management, business technology
    
TIBCO
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
Security practitioners and threat actors are constantly developing new techniques to gain advantages over the other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying their network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating the delivery of patches to stop exploits, and developing counter-measures to spot intruders. The threat actors looking to circumvent these measures are shifting their attention toward the next weakest link in the security chain – the user.
Tags : 
    
Palo Alto Networks
Published By: VeriSign     Published Date: Feb 10, 2011
In this must read white paper, you will learn about the new advances in attacks that exploit weaknesses of generic SSL to compromise server-server communication and how you can help prevent it.
Tags : 
verisign, spoofing server, server communication, ssl, data security breach, network security, enterprise network
    
VeriSign
Published By: SAP     Published Date: Apr 14, 2011
Discover how publishers, newspapers, studios, and broadcasting companies are using SAP solutions to automate the processes involved in acquisition and exploitation of content assets. They can accurately capture rights and effectively manage royalty processing for higher profits and better relationships.
Tags : 
intellectual property, contract management, rights availability, visibility, digital media content, rights management, content, royalties
    
SAP
Published By: Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
During NSS Labs’ 2018 Advanced Endpoint Protection (AEP) Group Test, CylancePROTECT® and CylanceOPTICS™ v2.0.1450 failed to initiate part of the CylanceOPTICS engine, which primarily impacted the exploit and blended threats test categories. This affected the Cylance® position on the Security Value Map (SVM)™. After working closely with NSS, Cylance rolled out a new version of its software (v2.2.1011) for CylanceOPTICS. Cylance submitted this updated product for follow-on testing using the AEP Test Methodology v2.0, the same methodology used in the AEP Group Test. The product improved its Block Rate by 6.9% and its Additional Detection Rate by 0.2%. Learn more about the results in the NSS Labs testing report.
Tags : 
endpoint protection, cylance, security
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today’s cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : 
ransomware, threats, cyber, security, data
    
Cylance
Published By: Iron Mountain     Published Date: Jun 01, 2015
L'économie de l'information apporte une stratégie qui aide les entreprises à optimiser la valeur de leurs données et à limiter les risques à chaque étape, de la création initiale des documents et des données à leur exploitation et à leur destruction sécurisée.
Tags : 
business technology
    
Iron Mountain
Published By: NewField IT     Published Date: Aug 19, 2008
The uninhibited flow of information within today's business environment has become a prerequisite of an organization's success and smooth operation. But within every organization, some of that information will be sensitive, and ensuring its safekeeping involves a comprehensive security policy. Like water coursing through a pressurized system, information has an unnerving habit of 'leaking' out through unchecked weak spots which have been identified and exploited by unscrupulous individuals.
Tags : 
knowledge management
    
NewField IT
Published By: K2     Published Date: Jan 07, 2016
BPM platforms help solution architects and business outcome owners accelerate application development, transform business processes, and digitalize business processes to exploit business moments. This research provides an overview of many of the products used to address these needs.
Tags : 
gartner market, business process management, bpm, networking, security, software development, it management
    
K2
Published By: AuditBoard     Published Date: Nov 26, 2018
Affecting over 200,000 machines in more than 150 countries, the ransomware known as Wanna Decryptor, or “WannaCry,” became the largest cybersecurity attack in history in May 2017. The malicious software locked out users from critical data, and demanded a ransom payment to unlock the contents. Governments, hospitals, and corporations scrambled to address the attack and prevent the infection from spreading. Ironically, the virus’ execution method was simple: it exploited a vulnerable Windows SMB protocol to spread – an exploit Microsoft had addressed two months prior to the attack with the release of a patch.
Tags : 
    
AuditBoard
Published By: IBM     Published Date: Aug 28, 2014
Analyst report from Aberdeen on how companies using analytics as part of customer service activities perform compared to those without analytics.
Tags : 
analytics, service analytics, customer lifecycle
    
IBM
Published By: IBM     Published Date: Oct 22, 2014
Great service is delivered one customer at a time and improving interactions across all channels means truly understanding customer wants and needs. Massive amounts of unstructured data exist in your organization and can deliver customer insight that is specific, relevant and actionable. Learn how to harness that data to provide great customer service.
Tags : 
customer service, service quality, customer satisfaction, content management, it management, data management
    
IBM
Published By: IBM     Published Date: Mar 11, 2015
Cyber attacks are growing every day and become serious threats to your organization, but how do you know and understand the threats out there? Download a copy of this book, and you discover the zero-day exploits and threats used to compromise your enterprise. You also learn about a promising new technology developed by Trusteer, an IBM company, which provides effective yet transparent protection to enterprise endpoints. Start reading Stopping Zero-Day Exploits For Dummies, Trusteer Special Edition, today!
Tags : 
ibm, cybercrime prevention, it security solutions, trusteer, security, it management, knowledge management, data management
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
Discover how IBM scored 97.7% block rate against exploits and fared against other tested products in NSS Labs 2013 Network IPS Comparative Analysis.
Tags : 
ibm, nss labs, product testing, network security, computer security, application security
    
IBM
Published By: IBM     Published Date: Jul 31, 2015
New endpoint solution.
Tags : 
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
This e-book examines today’s enterprise threat landscape and introduces IBM Security’s new endpoint solution to help stop exploits & targeted attacks.
Tags : 
ibm, zero-day, enterprise, threat, security, endpoint solution, malware, advanced persistent threats, cybercriminal, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Oct 03, 2017
The demand for new data about customers, customer behaviour, product usage, asset performance, and operational processes is growing rapidly. Almost every industry wants new data. Some examples of this are: • Financial services organisations want more data to improve risk decisions, for ‘Know Your Customer (KYC) compliance and for a 360 degree view of financial crime. • Utilities companies want smart meter data to give them deeper understanding of customer and grid usage and to allow them to exploit pricing elasticity. They also want sensor data to monitor grid health, to optimise field service and manage assets. Download now to learn more!
Tags : 
scaling data, big data, customer behavior, product usage, data integration
    
IBM
Published By: CarbonBlack     Published Date: Oct 26, 2016
Traditional antivirus (AV) just doesn’t cut it anymore. From ransomware that holds intellectual property hostage to sophisticated malware-less attacks that exploit PowerShell, scripting, and memory, endpoints are facing more security risk than ever before. As a result, companies have set their sights on the next generation of lightweight AV solutions.
Tags : 
security, it management, business technology
    
CarbonBlack
Published By: IBM     Published Date: Feb 14, 2014
People, machines, data, processes are more connected than ever before, in more ways, and at a pace not previously envisioned. Because of this, the means of user interaction are evolving rapidly, and the outcome is an explosion of information increasing at epic rates. Both the opportunity and the challenge for an organization is to execute a strategy to most effectively participate in, exploit and derive ongoing value from the expansive digital world. To evaluate and ultimately better facilitate this, many organizations are specifically defining a digital strategy as part of their overall general business strategy. Central to that digital strategy is the digital experience.
Tags : 
ibm, social media, marketing, crm, customer interaction, digital marketing, digital strategy, customer experience, analytics, rich media, mobile marketing
    
IBM
Published By: IBM     Published Date: Feb 14, 2014
"Welcome to the age of Social CRM, a different way of thinking about customer relationship management that focuses on using social media to enhance customer engagement. How prepared are companies to make this shift? Despite widespread adoption of social media, for most, Social CRM is still in its early stages, execution is patchy and concerns about ROI remain. To fully exploit the power of social media to connect with customers, organizations need to move beyond isolated projects to integrated programs and, ultimately, a Social CRM strategy."
Tags : 
ibm, marketing, social media, crm, social crm, customer service, customer interaction, customer relationship, marketing management, marketing strategy
    
IBM
Published By: McAfee     Published Date: Feb 08, 2013
NSS Labs provides overall exploit protection rates for 11 popular enterprise Endpoint Protection Products.
Tags : 
mcafee, epp, endpoint, protection, threats, malware, nss
    
McAfee
Published By: General Atomics     Published Date: Jan 13, 2015
The term “Big Data” has become virtually synonymous with “schema on read” unstructured data analysis and handling techniques like Hadoop. These “schema on read” techniques have been most famously exploited on relatively ephemeral human-readable data like retail trends, twitter sentiment, social network mining, log files, etc.
Tags : 
general atomics, big data, metadata, nirvana, hadoop
    
General Atomics
Published By: Altiscale     Published Date: Aug 25, 2015
Hype abounds about Big Data. And it's hard to know how to effectively exploit its potential. Learn how to separate fact from fiction in this new webinar + research note titled "Amazon EMR is Easy and 7 Other Myths." If you're considering launching a new Big Data initiative, or if you are currently struggling with Amazon EMR, view this 30 minute on-demand webinar + research note and dispel the most common untruths about Amazon EMR, as determined by leading Hadoop experts. Specifically, you'll learn: • The differences between Hadoop-as-a-Service and Amazon EMR • Why Hadoop on Amazon is not elastic • Why EMR is not a "plug-n-play" application • How costs get out of control with Amazon EMR
Tags : 
amazon emr, big data, haddop
    
Altiscale
Published By: Symantec     Published Date: Apr 09, 2012
Download this white paper, to learn how you can reduce the risk of hackers finding your site and attacking it by using automated vulnerability assessments to identify exploitable weaknesses and take corrective action.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign
    
Symantec
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee