tactics

Results 151 - 175 of 296Sort Results By: Published Date | Title | Company Name
Published By: Lumension     Published Date: Aug 25, 2014
Advanced Persistent Threat (APT) attacks exploit a single vulnerability and then use that foothold to penetrate more systems and gain access to more corporate information. A recent QuinStreet web seminar, sponsored by Lumension, discussed APT attacks and tactics for preventing them. This paper summarizes the talks given during that web seminar.
Tags : 
key tactics, apt, attacks, prevention, systems, security
    
Lumension
Published By: Magento     Published Date: Feb 15, 2018
This is a great opportunity to discuss the critical aspects of what makes B2B eCommerce successful. Join Magento Commerce, Magento Solution Partner, Monsoon Consulting, and leading UK supplier and industry leader in B2B online sales, Brymec, for The Anatomy of B2B Success webinar. In this webinar, Peter Sheldon shares how digital transformation is driving B2B online sales growth and provide tips on current eCommerce executive thinking. Guy Hewison and Russell Schlaudraff from Brymec share how they are delivering the ‘future of online ordering.’ If you are serious about growing your B2B eCommerce, discover: What's driving the move to online ordering and self service in B2B The importance of understanding who your customers’ buyer really is The common challenges and pitfalls B2B companies face with implementations Advice from Brymec for sourcing a B2B eCommerce platform Tactics for growing online sales and providing a better customer experience
Tags : 
    
Magento
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
Enterprises, beware. Threat actors are continuing to eye businesses for high returns on investment in Q1 2019, breaching infrastructure, exfiltrating or holding data hostage, and abusing weak credentials for continued, targeted monitoring. From a steadfast increase of pervasive Trojans, such as Emotet, to a resurgence of ransomware lodged against corporate targets, cybercriminals are going after organizations with a vengeance. Yet every cloud has a silver lining, and for all the additional effort thrown at businesses, consumer threats are now on the decline. Ransomware against consumers has slowed down to a trickle and cryptomining, at a fever pitch against consumers this time last year, has all but died. Interestingly, this has resulted in an overall decline in the volume of malware detections from Q4 2018 to Q1 2019. While threat actors made themselves busy with challenging new victims, they ensnared targets in the old ways, using tried-and-true malspam and social engineering tactic
Tags : 
    
MalwareBytes EMEA
Published By: Marketo     Published Date: Mar 11, 2014
In order for enterprise companies to be successful in today’s economy, sales and marketing teams must be aligned. Both departments must come together to develop strategies, processes and best practices to pave the foundation for collaboration. Understanding what marketing will provide and what to expect from sales is the first step. Use this playbook to begin your aligned lead generation efforts today.
Tags : 
marketo, sales, marketing, collaboration, sales tactics, lead generation, revenue success, team integration, middle of the funnel, bottom of the funnel, service level agreements, demographics
    
Marketo
Published By: Marketo     Published Date: Mar 11, 2014
Enterprise marketers have larger sends and bigger budgets, which increases their need to A/B test new techniques, layouts, and messaging for lead generation campaigns. Optimizing and improving conversion rates can make a big difference in marketing ROI, and lead to proven tactics and techniques organizations can adopt over time.
Tags : 
marketo, lead generation, marketing roi, metrics planning, first touch, multi touch, influences, a/b test, conversion rates, testing techniques
    
Marketo
Published By: Marketo     Published Date: Mar 22, 2018
The Engagement Economy—the reality that we consume and market in today—is a new era where everyone and everything is connected. And in this reality, consumer expectations have shifted to require more from the brands they buy from—they seek a personal relationship that offers them value wherever they are and whenever they are ready to engage. As the Engagement Economy matures, marketers must rapidly transform their strategies, methods, and tactics in order to stay relevant. The State of Engagement offers insights on engagement from over 2,000 global consumers and marketers. Download The State of Engagement to explore how: Consumers feel marketers are faring in making them feel wanted, understood, and connected to their brands Marketers and their organizations are engaging their consumers, employees, and partners Marketers can address the gaps between their activities and consumer perception
Tags : 
    
Marketo
Published By: Marketo     Published Date: Mar 18, 2019
The role of marketing is constantly evolving. More than ever, marketing has to prove its impact on the success of the business. Outside executives often believe that marketing exists solely to support sales, or as an arts function that hosts company events and puts logos on t-shirts. With the pressure increasing, the growing imperative for marketers to prove their worth has arrived. It’s time for marketers to take control over the revenue process, earn the respect of their organizational peers, and earn a seat at the table. What must marketers do to be seen as an integral part of the machine that drives revenue and growth? Download The Definitive Guide to Marketing Metrics and Analytics to learn about: Establishing a culture of accountability Planning programs with ROI in mind Creating a framework for measurement Embracing revenue performance management Mastering the art of forecasting Building dashboards to inform complex decisions Implementation across teams, tactics, and technolog
Tags : 
    
Marketo
Published By: Marketo     Published Date: Mar 13, 2014
Enterprise marketers have larger sends and bigger budgets, which increases their need to A/B test new techniques, layouts, and messaging for lead generation campaigns. Optimizing and improving conversion rates can make a big difference in marketing ROI, and lead to proven tactics and techniques organizations can adopt over time.
Tags : 
marketo, lead generation, marketing roi, metrics planning, first touch, multi touch, influences, a/b test, conversion rates, testing techniques
    
Marketo
Published By: Marketo     Published Date: Mar 13, 2014
In order for enterprise companies to be successful in today’s economy, sales and marketing teams must be aligned. Both departments must come together to develop strategies, processes and best practices to pave the foundation for collaboration. Understanding what marketing will provide and what to expect from sales is the first step. Use this playbook to begin your aligned lead generation efforts today.
Tags : 
marketo, sales, marketing, collaboration, sales tactics, lead generation, revenue success, team integration, middle of the funnel, bottom of the funnel, service level agreements, demographics
    
Marketo
Published By: Marketo     Published Date: May 06, 2014
Curious about how B2B enterprise content marketing has changed in the last year, or how enterprise marketers differ from their peers overall? This report from Content Marketing Institute, MarketingProfs, and Marketo covers tactics, strategies, challenges, budgets, and tools of enterprise B2B marketers in North America.
Tags : 
marketo enterprise, content marketing, marketing tactics, content strategy, enterprise marketers, b2b, marketing practices, cost effectiveness, integration, cross marketing, marketing strategy, content creation
    
Marketo
Published By: Marketo, INC.     Published Date: Sep 25, 2008
In this free 15-minute podcast, Laura Ramos of Forrester Research explains how B2B marketers can leverage Web 2.0.  Listen at your desk or on the road and discover: how to enhance marketing ROI by driving real engagement and dialog ... how to reach key decision-makers ... reasons behind the move from demand generation toward more organic demand management ... and more.  Understanding Web 2.0 tactics is a must for B2B marketers who want to compete.  Find out why; listen to this free podcast now.
Tags : 
using digital, promo code: wp2, marketing, b2b marketing, social marketing, social networks, social networking, interactive direct marketing, interactive demand generation, digital media, engagement, rich media, rich web, rich applications, blogging, rss, social networks, facebook, myspace, digital marketing
    
Marketo, INC.
Published By: McAfee EMEA     Published Date: Mar 14, 2018
Machine learning is all around us, from our smart home applications to driverless automobiles. The efficiency of automated decision-making is changing the game in cybersecurity, expanding the capabilities of humans by sifting through enormous quantities of data and presenting it as actionable intelligence. Machine learning makes security teams better, and vice versa. Human-machine teams deliver the best of both worlds, allowing endpoint security to continually evolve to stop new attack tactics. Your team deserves the best that cybersecurity has to offer, and today the best endpoint security products leverage machine learning.
Tags : 
    
McAfee EMEA
Published By: Medium Blue     Published Date: Jan 29, 2007
If you are looking to partner with a search engine optimization company, it’s important that you choose a firm you can trust. Many search engine optimization companies today use tactics that are questionable and that can lead to your site getting penalized by the major search engines. In this article, you will be given several important questions to ask any SEO firm that you are considering, and learn how to interpret the answers you are given.
Tags : 
search marketing, search engine optimization, outsourcing, seo firms, seo firm, seo
    
Medium Blue
Published By: Memorial Hermann     Published Date: Sep 19, 2014
Health care costs are already out of control. You’ve tried everything you can think of to reduce costs, but nothing seems to work. Learn where the real problem lies and what you can do about it by rethinking your approach. • Learn why the usual tactics do little to contain costs • See how carrier choice and location impact cost • Get educated on new approaches that contain costs
Tags : 
healthcare costs, approach, carrier, choice, location, impact, educated, reliable, providers, solution, business, manager, organization, employees, negotiations
    
Memorial Hermann
Published By: MessageLabs     Published Date: Sep 25, 2008
A close look at the data provides a clear picture of how spammers vary their tactics to overwhelm traditional corporate email defenses, through changes in duration, frequency and intensity among others. This whitepaper will help you understand these threats to your business, and how MessageLabs provides a unique solution.
Tags : 
messagelabs, spam, data analyst, traffic, trends, anti-spam, security, data management
    
MessageLabs
Published By: Michael C. Fina     Published Date: Oct 10, 2016
A robust 25 page handbook of tips, tricks, and tactics that will help your managers engage their employees more effectively using proven recognition, communication, and emotional intelligence skills.
Tags : 
michael c. fina, employee engagement, management tips, employee recognition
    
Michael C. Fina
Published By: Microsoft Azure     Published Date: Apr 11, 2018
While it’s clear what the potentials of cloud computing are for your organization, it may be unclear the adjustments your IT organization will need to make in transitioning to the cloud. This guide is designed to help your IT team more effectively implement and integrate cloud technologies. You’ll explore key cloud concepts as well as Azure-specific tips and tactics around: General architectures that incorporate security, identity, and cloud design principles. DevOps and how it fits with cloud technologies. Integrating, planning, and managing cloud resources. Microsoft Azure governance.
Tags : 
    
Microsoft Azure
Published By: Microsoft Office 365     Published Date: Oct 14, 2016
“Hi, this is Kevin from IT. We've been notified of a virus on your department’s machines.” Add some authentic hold music, and a social-engineering attacker can trick employees into sharing company info, like passwords. Learn how to use technology and prevention strategies to guard against dumpster diving, spear phishing, and other tactics with: Real-world prevention strategies Tools to spot suspicious actions Real-time behavioral malware analysis
Tags : 
protection, prevention, malware, security, cyber attacks, information
    
Microsoft Office 365
Published By: Mimecast     Published Date: Dec 20, 2018
Email remains the biggest entry point into your healthcare organization, and with medical records at least 10X as valuable as credit cards, potential payoffs are high. Security threats are real and debilitating – they can even affect patient care – and they aren’t going away anytime soon. Watch the Anatomy of an Email-Borne Attack webinar where we'll paint the current healthcare threat landscape for attacks and demonstrate an actual live hack. You will learn: Why and how the healthcare threat landscape is evolving How your email can be used as an entry point in multiple types of attack Attacker methodologies and the tactics and tools being used to exploit your users How to enhance email security and improve overall cyber resilience
Tags : 
healthcare, ransomware, ransomware attack, seg, secure email gateway
    
Mimecast
Published By: Mimecast     Published Date: Mar 19, 2019
Human error, careless behavior and lack of security inspections on internally-generated email are putting organizations at risk. Basic, outside-in email security won’t provide the necessary protection for advanced tactics like the distribution of malware, malicious URLs or impersonation emails – all things that can quickly traverse an internal network with just one click. Check out this E-book to learn about the three riskiest internal threat actors and the key things you can do to combat internal threats.
Tags : 
    
Mimecast
Published By: MobileIron     Published Date: Feb 05, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Published By: MobileIron     Published Date: Aug 03, 2016
In this edition we discuss emerging risks, report OS enterprise share, and list the top blacklisted consumer apps. We conclude with our recommendations for enterprises to protect their assets against mobile risks and threats. Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. When attacks against users are successful, they can result in the loss of both personal and business data.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Aug 04, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Published By: MobileIron     Published Date: Oct 21, 2016
Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. However, when attacks against users are successful, they can result in the loss of both personal and business data. Download now to learn how to increase your mobile security.
Tags : 
    
MobileIron
Published By: Monetate     Published Date: Aug 19, 2014
82 percent of shoppers say they would buy more items from a brand if the emails they sent were more personalized. But how do you deliver that level of revenue-driving personalization? This white paper offer five tactics that will personalize your email beyond the subject line and drive real business growth.
Tags : 
subject line, geo-targeting, personalized emails, email strategies
    
Monetate
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee