cyber security

Results 26 - 50 of 935Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 04, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, cybersecurity, cybersecurity intelligence index, security threats, security, knowledge management
    
IBM
Published By: IBM     Published Date: Jan 12, 2016
Analysis of cyber attack and incident data for the Retail industry from IBM's worldwide security services operations.
Tags : 
customer experience, transaction processing, omnichannel banking, consumer demands, customer interaction, shopper experience, retail
    
IBM
Published By: Cisco     Published Date: Jun 16, 2016
Attackers are commandeering legitimate infrastructure and reaping millions in profit. Defenders are struggling to detect and combat threats, and confidence is falling.
Tags : 
security, application security, access control, security policies
    
Cisco
Published By: ThreatTrack Security     Published Date: May 21, 2015
This report provides a 360 degree view of organizations' security threats, response plans, processes, and investments. More than 800 security decision makers and practitioners were surveyed in December 2014 across North America and Europe.
Tags : 
cyberthreat, security, malware, defense, it management, knowledge management, data management
    
ThreatTrack Security
Published By: Citrix Systems     Published Date: Jul 28, 2015
CyberEdge Group’s second annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 28, 2015
CyberEdge Group’s second annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 28, 2015
CyberEdge Group’s second annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.
Tags : 
    
Citrix Systems
Published By: CrowdStrike     Published Date: Feb 01, 2017
This year’s Cyber Intrusion Services Casebook focuses on in-depth digital forensics, incident response (IR) and remediation services performed on behalf of actual CrowdStrike clients. Real-life examples drawn from notable CrowdStrike Services IR engagements in 2016 — including the now-infamous hack of the Democratic National Committee (DNC) —are covered with an emphasis on best practices organizations can follow to identify and eject attackers before a devastating breach occurs. Download this report to learn: • How CrowdStrike’s Falcon OverWatch and professional services teams discovered and attributed the DNC intrusion to nation-state threat actors FANCY BEAR and COZY BEAR • The gaps in security processes and planning that your organization can address now to stop the next breach • The specific tactics, techniques and procedures (TTPs) a range of nation-state and eCrime adversaries used to penetrate their victims’ defenses, and how they attempted to cover their tracks
Tags : 
    
CrowdStrike
Published By: IBM     Published Date: Jan 09, 2017
Reviewing a year of serious data breaches, major attacks and new vulnerabilities. The IBM X-Force 2016 Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide in 2015.
Tags : 
ibm, security, ibm x-force, cyber security intelligence index., cyber security, intelligence, enterprise applications, business technology
    
IBM
Published By: Cisco     Published Date: Mar 17, 2017
The Cisco 2017 Annual Cybersecurity Report presents research, insights, and perspectives from Cisco Security Research. This research can help your organisation respond effectively to today’s rapidly evolving and sophisticated threats.
Tags : 
cyber security, threat and vulnerability management, security, attacks, threat detection
    
Cisco
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Cybercriminals can be goal-driven and patient, and they often have a singular focus, plenty of time and access to vast, modern technical resources. Both organized and forum-based criminals are working constantly to find innovative and efficient ways to steal information and money with the lowest risk to their personal freedom. If we wish to stay “one step ahead” of the threats detailed in this report, awareness of online criminal threats, techniques and markets is our best defense.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Dome9     Published Date: Apr 25, 2018
Organizations continue to adopt cloud computing at a rapid pace to benefit from increased efficiency, better scalability, and faster deployments. As more workloads are shifting to the cloud, cybersecurity professionals remain concerned about security of data, systems, and services in the cloud. To cope with new security challenges, security teams are forced to reassess their security posture and strategies as traditional security tools are often not suited for the challenges of dynamic, virtual and distributed cloud environments. This technology challenge is only exacerbated by the dramatic shortage of skilled cybersecurity professionals.
Tags : 
    
Dome9
Published By: LogRhythm     Published Date: Jun 19, 2018
As uncertainties—cybersecurity and otherwise—swim around us with increased velocity and frequency, it’s always helpful to hear directly from security leaders in the trenches of our industry. These first-hand accounts have the unique ability to shed light on the challenges security professionals and their teams face nearly every day of their work lives. That’s precisely what this “2018 Cybersecurity: Perceptions & Practices” benchmark survey accomplishes. It provides insights into the state of the cybersecurity practice of 751 mid- to large-sized organizations in the United States, United Kingdom, and AsiaPacific regions.
Tags : 
cybersecurity, survey, security, leaders, data, industry
    
LogRhythm
Published By: Gigamon     Published Date: Dec 13, 2018
Despite increasing security budgets, companies find there is too much data for new tools to analyze, not enough skilled IT security professionals and little confidence in current technology investments. Read the “2018 Cyberthreat Defense Report” to learn how your peers are managing increased breaches, vulnerabilities and encrypted traffic. How does your cyberthreat approach compare to other security pros who are protecting their organizations? Learn now.
Tags : 
    
Gigamon
Published By: Great Bay Software     Published Date: Apr 12, 2018
"CyberEdge Group’s fifth-annual Cyberthreat Defense Report is a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. The new 2018 report provides the most geographically comprehensive view of IT security perceptions in our industry. With a 360-degree view of organizations’ security threats, security professionals can identify issues facing the market and know how their peers are reacting. Key insights from this year’s report include: • ‘Lack of skilled personnel’ is the greatest inhibitor to IT security’s success • 77% of networks were breached last year – the first decline in five years! • 12% of a typical enterprise IT budget is spent on security • 55% of organizations were compromised by ransomware last year Download the Cyberthreat Defense Report Executive Summary today!"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jul 16, 2018
"CyberEdge Group’s fifth-annual Cyberthreat Defense Report is a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. The new 2018 report provides the most geographically comprehensive view of IT security perceptions in our industry. With a 360-degree view of organizations’ security threats, security professionals can identify issues facing the market and know how their peers are reacting. Key insights from this year’s report include: • ‘Lack of skilled personnel’ is the greatest inhibitor to IT security’s success • 77% of networks were breached last year – the first decline in five years! • 12% of a typical enterprise IT budget is spent on security • 55% of organizations were compromised by ransomware last year Download the Cyberthreat Defense Report Executive Summary today!"
Tags : 
    
Great Bay Software
Published By: Fiserv     Published Date: Jan 16, 2018
For the past decade, financial institutions have created sophisticated digital platforms for consumers to access, save, share and interact with their financial accounts. As sophisticated as these digital platforms have become, cyber criminals continue to pose an ever-present risk for everyone – from individual consumers to large corporations In his recent article, 2018 Outlook: Customer Experience and Security Strike a Balance, Andrew Davies, vice president of global market strategy for Fiserv’s Financial Crime Risk Management division, explains how and why security will become a key differentiator for financial institutions as they respond to a changing landscape, which includes: •Global payment initiatives •Open Banking standards •Artificial intelligence and machine learning •Consumer demand for real-time fraud prevention and detection
Tags : 
2018 trends, aml trends, money laundering trends
    
Fiserv
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
Ponemon Institute is pleased to present The Value of Artificial Intelligence in Cybersecurity sponsored by IBM Security. The purpose of this research is to understand trends in the use of artificial intelligence and how to overcome barriers to full adoption.
Tags : 
    
Group M_IBM Q119
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Fortinet’s 2018 Security Implications of Digital Transformation Survey looks at the state of cybersecurity in organizations around the world from the lens of digital transformation (DX). Three hundred responses from CISOs and CSOs at large organizations helped us identify several current trends: n Digital transformation is the most impactful IT trend on businesses today, with 92% responding that it has a large impact today. n Security is by far the biggest challenge to DX efforts, with 85% of respondents saying it has a large impact. n The typical organization saw four attacks that resulted in data loss, outages, or compliance events over two years. n Many companies have automated some of their security procedures, but they are even further behind with other security best practices. n Big chunks of infrastructure remain vulnerable in the typical organization, with 25% of the infrastructure not adequately protected at the typical organization. Looking more deeply into the data, we ident
Tags : 
    
Fortinet EMEA
Published By: Gigamon     Published Date: Sep 03, 2019
CyberEdge Group’s sixth annual Cyberthreat Defense Report reveals how IT security professionals perceive the security posture of their organizations, the challenges they face in establishing effective cyberthreat defenses, and the plans they have to overcome those challenges. Read on to learn about some of the key findings from this year’s report.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 21, 2019
In spite of increasing cybersecurity budgets, organizations are dealing with a worsening skills shortage, obstacles to threat hunting, and ongoing cyberattacks. Download the “2019 Cyberthreat Defense Report” now to learn how IT security pros plan to address these challenges. You’ll learn how to deal with inevitable cyberattacks, eliminate network blind spots and increase the signal-to-noise ratio. Learn more about how IT security pros perceive cyberthreats and plan to defend against them. Download now!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Apr 10, 2019
In spite of increasing cybersecurity budgets, organizations are dealing with a worsening skills shortage, obstacles to threat hunting, and ongoing cyberattacks. Download the “2019 Cyberthreat Defense Report” now to learn how IT security pros plan to address these challenges. You’ll learn how to deal with inevitable cyberattacks, eliminate network blind spots and increase the signal-to-noise ratio. Learn more about how IT security pros perceive cyberthreats and plan to defend against them. Download now!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Sep 11, 2019
CyberEdge Group’s sixth annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Based on a survey of 1,200 IT security decision makers and practitioners conducted in November 2018, the report delivers countless insights IT security teams can use to better understand how their perceptions, priorities, and security postures stack up against those of their peers. Notable Findings ? Cyberthreat trifecta. Of 11 categories of cyberthreats, malware is the greatest concern for responding organizations, followed closely by phishing and ransomware (see Figure 1). ? Healthy security budgets. The average security budget is increasing 4.9% in 2019 and represents 12.5% of an organization’s overall budget for IT. ? Threat hunting obstacle. The top inhibitor to achieving effective threat-hunting capabilities is the difficulty organizations are having implementing or integrating related tools. ? Security’s mos
Tags : 
    
Gigamon
Published By: Illusive Networks     Published Date: Apr 10, 2019
Illusive Networks is proud to once again sponsor the Cyberthreat Defense Report by CyberEdge Group, now in its sixth year, to help security leaders assess and shape their cybersecurity programs. Download this comprehensive report to learn more about the most wanted security management and operations technology for 2019, which security processes organizations struggle with the most, and how organizations are trying to detect advanced cyberthreats more quickly.
Tags : 
cybersecurity, cyber threats, apt, targeted attacks, cyberedge, advanced persistent threats, threat management, illusive networks
    
Illusive Networks
Published By: BlackBerry Cylance     Published Date: Sep 13, 2017
The Forrester Consulting report provides a framework to evaluate the potential financial impact and benefits of investing in a prevention based cybersecurity strategy with Cylance.
Tags : 
    
BlackBerry Cylance
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee